insights-operator/gathers.json0000640000000000000000000003551015114533347015263 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":56,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":58,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":83,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":129,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":13,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":47,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"workloads/workload_info","duration_in_ms":4824,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":58,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":59,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":63,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":64,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":68,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":56,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":61,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":68,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":81,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":259,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":9,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":44,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":59,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":68,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":280,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":45,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":62,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":62,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":77,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":25225,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":7,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":60,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10871,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":61,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":63,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":57,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":143,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":187,"records_count":9,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":45,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":19,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":15,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":59,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":66,"records_count":6,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":67,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":109,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":9,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":11,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":10,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":60,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":46,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig","duration_in_ms":32972,"records_count":157,"errors":["function \"machine_autoscalers\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"metrics\" failed with an error","function \"tsdb_status\" failed with an error","function \"active_alerts\" failed with an error","function \"silenced_alerts\" failed with an error","function \"support_secret\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5bf4d88c6f-n8t5c/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-5bf4d88c6f-n8t5c/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":51,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":218,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":26,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":125,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":32968,"records_count":70,"errors":["the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c.json\" was already recorded and had the fingerprint \"817b30377a686c4c090279718bab407baea89277550f3aef7b1eaba213bd7d41\", overwriting with the record having fingerprint \"817b30377a686c4c090279718bab407baea89277550f3aef7b1eaba213bd7d41\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5bf4d88c6f-n8t5c/etcd-operator_previous.log\" was already recorded and had the fingerprint \"a479410a4c6fc3be115524c20600f9d47e61ec63e0429c4d71213d163b5061d0\", overwriting with the record having fingerprint \"a479410a4c6fc3be115524c20600f9d47e61ec63e0429c4d71213d163b5061d0\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-5bf4d88c6f-n8t5c/etcd-operator_current.log\" was already recorded and had the fingerprint \"e8559e5a1b703d8bf23bcd710dbee7cb39086a3adf1b0d95b18732eddb19a952\", overwriting with the record having fingerprint \"e8559e5a1b703d8bf23bcd710dbee7cb39086a3adf1b0d95b18732eddb19a952\""],"warnings":["warning: the record with the same fingerprint \"817b30377a686c4c090279718bab407baea89277550f3aef7b1eaba213bd7d41\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c.json\"","warning: the record with the same fingerprint \"a479410a4c6fc3be115524c20600f9d47e61ec63e0429c4d71213d163b5061d0\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5bf4d88c6f-n8t5c/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5bf4d88c6f-n8t5c/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"e8559e5a1b703d8bf23bcd710dbee7cb39086a3adf1b0d95b18732eddb19a952\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5bf4d88c6f-n8t5c/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-5bf4d88c6f-n8t5c/etcd-operator_current.log\""],"panic":null},{"name":"workloads","duration_in_ms":4825,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":6,"records_count":0,"errors":["machineautoscalers.autoscaling.openshift.io is forbidden: User \"system:serviceaccount:openshift-insights:gather\" cannot list resource \"machineautoscalers\" in API group \"autoscaling.openshift.io\" at the cluster scope"],"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":33,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":66,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":57,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":59,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":65,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":67,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":63,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":45,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":93,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":13,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":228,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":61,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":66,"records_count":1,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":38.636,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515114533347017770 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515114533347021072 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005012515114533346014245 0ustar0000000000000000{"pods":78,"imageCount":58,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:cfde59e48cd5dee3721f34d249cb119cc3259fd857965d34f9c7ed83b0c363a1","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:916566bb9d0143352324233d460ad94697719c11c8c9158e3aea8f475941751f","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:8a3d37aa7a22c68afa963ecfb4b43c52cccf152580cd66e4d5382fb69e4037cc","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:9432c13d76bd4ba4eb9197c050cf88c0d701fa2055eeb59257e2e23901f9fdff","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:631a3798b749fecc041a99929eb946618df723e15055e805ff752a1a1273481c","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:631a3798b749fecc041a99929eb946618df723e15055e805ff752a1a1273481c","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:9014f384de5f9a0b7418d5869ad349abb9588d16bd09ed650a163c045315dbff","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4ecc5bac651ff1942865baee5159582e9602c89b47eeab18400a32abcba8f690","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9014f384de5f9a0b7418d5869ad349abb9588d16bd09ed650a163c045315dbff","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:2632d7f05d5a992e91038ded81c715898f3fe803420a9b67a0201e9fd8075213","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b00c658332d6c6786bd969b26097c20a78c79c045f1692a8809234f5fb586c22","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:3b8d91a25eeb9f02041e947adb3487da3e7ab8449d3d2ad015827e7954df7b34","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"invalidCount":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7664a2d4cb10e82ed32abbf95799f43fc3d10135d7dd94799730de504a89680a","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:97d26892192b552c16527bf2771e1b86528ab581a02dd9279cdf71c194830e3e","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d3ce2cbf1032ad0f24f204db73687002fcf302e86ebde3945801c74351b64576","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:10e57ca7611f79710f05777dc6a8f31c7e04eb09da4d8d793a5acfbf0e4692d7","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7e438b814f8e16f00b3fc4b69991af80eee79ae111d2a707f34aa64b2ccbb6eb","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:7e438b814f8e16f00b3fc4b69991af80eee79ae111d2a707f34aa64b2ccbb6eb","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c416b201d480bddb5a4960ec42f4740761a1335001cf84ba5ae19ad6857771b1","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":3,"terminalCount":1,"shapes":[{"restartAlways":false,"containers":[{"imageID":"sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","firstCommand":"FATPL2W-sitV","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8139ed65c0a0a4b0f253b715c11cc52be027efe8a4774da9ccce35c78ef439da","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:61664aa69b33349cc6de45e44ae6033e7f483c034ea01c0d9a8ca08a12d88e3a","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8139ed65c0a0a4b0f253b715c11cc52be027efe8a4774da9ccce35c78ef439da","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eb928c13a46d3fb45f4a881892d023a92d610a5430be0ffd916aaf8da8e7d297","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:33a20002692769235e95271ab071783c57ff50681088fa1035b86af31e73cf20","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:3c1edf52f70bf9b1d1457e0c4111bc79cdaa1edd659ddbdb9d8176eff8b46956","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1386b0fcb731d843f15fb64532f8b676c927821d69dd3d4503c973c3e2a04216","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:1386b0fcb731d843f15fb64532f8b676c927821d69dd3d4503c973c3e2a04216","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:8cc27777e72233024fe84ee1faa168aec715a0b24912a3ce70715ddccba328df","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:75d996f6147edb88c09fd1a052099de66638590d7d03a735006244bc9e19f898","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8eabac819f289e29d75c7ab172d8124554849a47f0b00770928c3eb19a5a31c4","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:dd38b8be3af889b0f97e2df41517c89a11260901432a9a1ee943195bb3a22737","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:dd38b8be3af889b0f97e2df41517c89a11260901432a9a1ee943195bb3a22737","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:72bbe2c638872937108f647950ab8ad35c0428ca8ecc6a39a8314aace7d95078","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:a92c310ce30dcb3de85d6aac868e0d80919670fa29ef83d55edd96b0cae35563","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:fd3e9f8f00a59bda7483ec7dc8a0ed602f9ca30e3d72b22072dbdf2819da3f61","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:7c2431a990bcddde98829abda81950247021a2ebbabc964b1516ea046b5f1d4e","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","firstCommand":"zT6_GoC4_8OY","firstArg":"r7zEsGNvlNrk"},{"imageID":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","firstCommand":"aC8iSHmKHojh","firstArg":"eE7ekwlit3Mq"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:86af77350cfe6fd69280157e4162aa0147873d9431c641ae4ad3e881ff768a73","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c3a77aa4d03b89ea284e3467a268e5989a77a2ef63e685eb1d5c5ea5b3922b7a","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d2d169850894a59fb18012f5b1cde98a7e30fa5b86967c9d16e4cba5e88d9a8d","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aa24edce3d740f84c40018e94cdbf2bc7375268d13d57c2d664e43a46ccea3fc","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:eddedae7578d79b5a3f748000ae5c00b9f14a04710f9f9ec7b52fc569be5dfb8","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011410715114533341033705 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-d7b67d8cf-krp6c2025-12-05T10:40:50.737157671Z E1205 10:40:50.737124 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:50.737231273Z E1205 10:40:50.737125 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:50.903521994Z E1205 10:40:50.903288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:50.903617207Z E1205 10:40:50.903586 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:50.903784661Z E1205 10:40:50.903756 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:50.903958735Z E1205 10:40:50.903929 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:50.904151440Z E1205 10:40:50.904114 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:51.231249403Z E1205 10:40:51.231191 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:51.231411967Z E1205 10:40:51.231387 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:51.231555271Z E1205 10:40:51.231517 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:51.231700924Z E1205 10:40:51.231665 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:51.231787006Z E1205 10:40:51.231759 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:51.733288139Z time="2025-12-05T10:40:51Z" level=info msg="connecting to source" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2025-12-05T10:40:51.747712801Z W1205 10:40:51.747618 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.234.80:50051: connect: connection refused" 2025-12-05T10:40:51.879585287Z E1205 10:40:51.879536 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:51.879837053Z E1205 10:40:51.879811 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:51.880009067Z E1205 10:40:51.879983 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:51.880198392Z E1205 10:40:51.880155 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:51.880347036Z E1205 10:40:51.880316 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:52.141317336Z time="2025-12-05T10:40:52Z" level=info msg="connecting to source" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2025-12-05T10:40:52.147065394Z W1205 10:40:52.147009 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.71.214:50051: connect: connection refused" 2025-12-05T10:40:52.757065561Z W1205 10:40:52.755679 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.234.80:50051: connect: connection refused" 2025-12-05T10:40:53.151906928Z W1205 10:40:53.151656 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.71.214:50051: connect: connection refused" 2025-12-05T10:40:53.163561487Z E1205 10:40:53.163500 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:53.163561487Z E1205 10:40:53.163524 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:53.163633179Z E1205 10:40:53.163500 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:53.163702041Z E1205 10:40:53.163505 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:53.163893396Z E1205 10:40:53.163864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:53.334955840Z time="2025-12-05T10:40:53Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2025-12-05T10:40:53.338597244Z W1205 10:40:53.338530 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.45.91:50051: connect: connection refused" 2025-12-05T10:40:54.343036477Z W1205 10:40:54.342955 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.45.91:50051: connect: connection refused" 2025-12-05T10:40:54.534118358Z time="2025-12-05T10:40:54Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2025-12-05T10:40:54.539146787Z W1205 10:40:54.539101 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.245.147:50051: connect: connection refused" 2025-12-05T10:40:54.568195795Z W1205 10:40:54.568139 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.234.80:50051: connect: connection refused" 2025-12-05T10:40:54.944836323Z W1205 10:40:54.944787 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.71.214:50051: connect: connection refused" 2025-12-05T10:40:55.337484993Z time="2025-12-05T10:40:55Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2025-12-05T10:40:55.337627957Z time="2025-12-05T10:40:55Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.234.80:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2025-12-05T10:40:55.543169229Z W1205 10:40:55.543095 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.245.147:50051: connect: connection refused" 2025-12-05T10:40:55.653173511Z W1205 10:40:55.653131 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.45.91:50051: connect: connection refused" 2025-12-05T10:40:55.730765199Z E1205 10:40:55.730690 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:55.735569923Z E1205 10:40:55.735515 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:55.735594504Z E1205 10:40:55.735135 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:55.735776048Z E1205 10:40:55.735750 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:55.736139068Z E1205 10:40:55.736111 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:56.540103158Z time="2025-12-05T10:40:56Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2025-12-05T10:40:56.540215302Z time="2025-12-05T10:40:56Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.71.214:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2025-12-05T10:40:57.053344574Z W1205 10:40:57.053277 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.234.80:50051: connect: connection refused" 2025-12-05T10:40:57.055281864Z W1205 10:40:57.055237 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.245.147:50051: connect: connection refused" 2025-12-05T10:40:57.334778321Z time="2025-12-05T10:40:57Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2025-12-05T10:40:57.334819712Z time="2025-12-05T10:40:57Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.45.91:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2025-12-05T10:40:57.556043298Z W1205 10:40:57.555991 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.71.214:50051: connect: connection refused" 2025-12-05T10:40:57.895526360Z W1205 10:40:57.895449 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.45.91:50051: connect: connection refused" 2025-12-05T10:40:58.534457051Z time="2025-12-05T10:40:58Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2025-12-05T10:40:58.534494732Z time="2025-12-05T10:40:58Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.245.147:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2025-12-05T10:40:59.677473322Z W1205 10:40:59.677384 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.245.147:50051: connect: connection refused" 2025-12-05T10:41:00.778789299Z W1205 10:41:00.778715 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.234.80:50051: connect: connection refused" 2025-12-05T10:41:00.862395613Z E1205 10:41:00.862319 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:00.862706510Z E1205 10:41:00.862638 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:00.862858794Z E1205 10:41:00.862817 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:00.863015108Z E1205 10:41:00.862981 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:00.863196263Z E1205 10:41:00.863158 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:01.046069912Z time="2025-12-05T10:41:01Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2025-12-05T10:41:01.046134943Z time="2025-12-05T10:41:01Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.234.80:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2025-12-05T10:41:01.191787464Z W1205 10:41:01.191703 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.45.91:50051: connect: connection refused" 2025-12-05T10:41:01.910923090Z W1205 10:41:01.910844 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.71.214:50051: connect: connection refused" 2025-12-05T10:41:02.245974648Z E1205 10:41:02.245916 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.255835592Z E1205 10:41:02.255782 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.256581050Z E1205 10:41:02.255914 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.259523636Z E1205 10:41:02.256056 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.259523636Z E1205 10:41:02.256140 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:03.300741126Z time="2025-12-05T10:41:03Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2025-12-05T10:41:03.300741126Z time="2025-12-05T10:41:03Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.71.214:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2025-12-05T10:41:03.301582318Z time="2025-12-05T10:41:03Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2025-12-05T10:41:03.301582318Z time="2025-12-05T10:41:03Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.45.91:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2025-12-05T10:41:03.336584670Z W1205 10:41:03.336509 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.245.147:50051: connect: connection refused" 2025-12-05T10:41:04.491842426Z time="2025-12-05T10:41:04Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2025-12-05T10:41:04.491892587Z time="2025-12-05T10:41:04Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.245.147:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2025-12-05T10:41:06.712820383Z W1205 10:41:06.712771 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.234.80:50051: connect: connection refused" 2025-12-05T10:41:07.050681002Z W1205 10:41:07.050614 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.45.91:50051: connect: connection refused" 2025-12-05T10:41:08.368914416Z W1205 10:41:08.366541 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.71.214:50051: connect: connection refused" 2025-12-05T10:41:08.857006633Z W1205 10:41:08.856071 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.245.147:50051: connect: connection refused" 2025-12-05T10:41:11.108900527Z E1205 10:41:11.108834 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:11.108955218Z E1205 10:41:11.108935 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:11.109016130Z E1205 10:41:11.108974 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:11.109140483Z E1205 10:41:11.109116 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:11.109197324Z E1205 10:41:11.109171 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:16.368633017Z W1205 10:41:16.368526 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.234.80:50051: connect: connection refused" 2025-12-05T10:41:18.841259194Z W1205 10:41:18.841183 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.45.91:50051: connect: connection refused" 2025-12-05T10:41:20.170483211Z W1205 10:41:20.170363 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.245.147:50051: connect: connection refused" 2025-12-05T10:41:20.572519482Z W1205 10:41:20.572458 1 logging.go:55] [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.71.214:50051: connect: connection refused" 2025-12-05T10:41:32.279287257Z E1205 10:41:32.279209 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.279287257Z E1205 10:41:32.279262 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.282027787Z E1205 10:41:32.279371 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.282027787Z E1205 10:41:32.279465 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.282027787Z E1205 10:41:32.279466 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.388403936Z E1205 10:41:32.388296 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.393691043Z E1205 10:41:32.393604 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.329533978Z W1205 10:41:34.329466 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.245.147:50051: connect: connection refused" 2025-12-05T10:41:35.661217666Z W1205 10:41:35.661138 1 logging.go:55] [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.234.80:50051: connect: connection refused" 2025-12-05T10:41:36.218862126Z W1205 10:41:36.218767 1 logging.go:55] [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.45.91:50051: connect: connection refused" package-server-manager_current.log0000640000000000000000000003437415114533341036654 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-67477646d4-nm8cn2025-12-05T10:38:14.251077775Z 2025-12-05T10:38:14Z INFO setup starting manager 2025-12-05T10:38:14.252213496Z 2025-12-05T10:38:14Z INFO controller-runtime.metrics Starting metrics server 2025-12-05T10:38:14.252488765Z 2025-12-05T10:38:14Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2025-12-05T10:38:14.252557767Z 2025-12-05T10:38:14Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2025-12-05T10:38:14.252591558Z 2025-12-05T10:38:14Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2025-12-05T10:38:14.252621659Z I1205 10:38:14.252582 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2025-12-05T10:38:14.291079745Z I1205 10:38:14.291023 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2025-12-05T10:38:14.295940993Z 2025-12-05T10:38:14Z DEBUG events package-server-manager-67477646d4-nm8cn_a1665285-410f-4721-91fa-59460e820797 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"a31689f2-8d09-44ec-91f1-445c39c04ad9","apiVersion":"coordination.k8s.io/v1","resourceVersion":"6788"}, "reason": "LeaderElection"} 2025-12-05T10:38:14.296033616Z 2025-12-05T10:38:14Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2025-12-05T10:38:14.296045156Z 2025-12-05T10:38:14Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2025-12-05T10:38:14.296045156Z 2025-12-05T10:38:14Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2025-12-05T10:38:14.438303117Z 2025-12-05T10:38:14Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2025-12-05T10:38:14.438401090Z 2025-12-05T10:38:14Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2025-12-05T10:38:14.438635028Z 2025-12-05T10:38:14Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2025-12-05T10:38:14.438674659Z 2025-12-05T10:38:14Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:14.757660616Z 2025-12-05T10:38:14Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:14.757660616Z 2025-12-05T10:38:14Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2025-12-05T10:38:14.800470727Z 2025-12-05T10:38:14Z INFO controllers.packageserver attempting to create the packageserver csv 2025-12-05T10:38:14.814610797Z 2025-12-05T10:38:14Z INFO controllers.packageserver updating csv spec 2025-12-05T10:38:14.842480215Z 2025-12-05T10:38:14Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2025-12-05T10:38:14.842480215Z 2025-12-05T10:38:14Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:14.846458087Z 2025-12-05T10:38:14Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2025-12-05T10:38:14.846458087Z 2025-12-05T10:38:14Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:14.846458087Z 2025-12-05T10:38:14Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:14.846458087Z 2025-12-05T10:38:14Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2025-12-05T10:38:14.897606773Z 2025-12-05T10:38:14Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2025-12-05T10:38:14.897606773Z 2025-12-05T10:38:14Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:14.897666534Z 2025-12-05T10:38:14Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2025-12-05T10:38:14.897666534Z 2025-12-05T10:38:14Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:14.897785459Z 2025-12-05T10:38:14Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:14.897799669Z 2025-12-05T10:38:14Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2025-12-05T10:38:14.939304732Z 2025-12-05T10:38:14Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2025-12-05T10:38:14.939304732Z 2025-12-05T10:38:14Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:15.047393768Z 2025-12-05T10:38:15Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2025-12-05T10:38:15.047393768Z 2025-12-05T10:38:15Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:15.047393768Z 2025-12-05T10:38:15Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:38:15.047393768Z 2025-12-05T10:38:15Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2025-12-05T10:38:15.071858880Z 2025-12-05T10:38:15Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2025-12-05T10:38:15.073339231Z 2025-12-05T10:38:15Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:39:48.326201118Z E1205 10:39:48.326069 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path 2025-12-05T10:40:31.500900601Z 2025-12-05T10:40:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2025-12-05T10:40:31.500900601Z 2025-12-05T10:40:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:31.500900601Z 2025-12-05T10:40:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:31.500900601Z 2025-12-05T10:40:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2025-12-05T10:40:31.513574448Z 2025-12-05T10:40:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2025-12-05T10:40:31.513574448Z 2025-12-05T10:40:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:31.528009160Z 2025-12-05T10:40:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2025-12-05T10:40:31.528009160Z 2025-12-05T10:40:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:31.528009160Z 2025-12-05T10:40:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:31.528046511Z 2025-12-05T10:40:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2025-12-05T10:40:31.553223669Z 2025-12-05T10:40:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2025-12-05T10:40:31.553223669Z 2025-12-05T10:40:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:31.657143295Z 2025-12-05T10:40:31Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2025-12-05T10:40:31.657143295Z 2025-12-05T10:40:31Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:31.657143295Z 2025-12-05T10:40:31Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:31.658938271Z 2025-12-05T10:40:31Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2025-12-05T10:40:31.687164777Z 2025-12-05T10:40:31Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2025-12-05T10:40:31.687164777Z 2025-12-05T10:40:31Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:38.169012208Z 2025-12-05T10:40:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2025-12-05T10:40:38.169012208Z 2025-12-05T10:40:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:38.188549201Z 2025-12-05T10:40:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:38.198098676Z 2025-12-05T10:40:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2025-12-05T10:40:38.233893928Z 2025-12-05T10:40:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2025-12-05T10:40:38.233984740Z 2025-12-05T10:40:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:38.376805278Z 2025-12-05T10:40:38Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2025-12-05T10:40:38.376805278Z 2025-12-05T10:40:38Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:38.376849629Z 2025-12-05T10:40:38Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2025-12-05T10:40:38.376857469Z 2025-12-05T10:40:38Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2025-12-05T10:40:38.386666902Z 2025-12-05T10:40:38Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2025-12-05T10:40:38.386666902Z 2025-12-05T10:40:38Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415114533341035345 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-67477646d4-nm8cn2025-12-05T10:37:57.507304870Z W1205 10:37:57.507098 1 deprecated.go:66] 2025-12-05T10:37:57.507304870Z ==== Removed Flag Warning ====================== 2025-12-05T10:37:57.507304870Z 2025-12-05T10:37:57.507304870Z logtostderr is removed in the k8s upstream and has no effect any more. 2025-12-05T10:37:57.507304870Z 2025-12-05T10:37:57.507304870Z =============================================== 2025-12-05T10:37:57.507304870Z 2025-12-05T10:37:57.507630939Z I1205 10:37:57.507603 1 kube-rbac-proxy.go:233] Valid token audiences: 2025-12-05T10:37:57.509255015Z I1205 10:37:57.508577 1 kube-rbac-proxy.go:347] Reading certificate files 2025-12-05T10:37:57.509255015Z I1205 10:37:57.508843 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2025-12-05T10:37:57.509343968Z I1205 10:37:57.509326 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415114533341033347 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-7cd7dbb44c-d25sk2025-12-05T10:41:10.416608211Z time="2025-12-05T10:41:10Z" level=info msg="install strategy successful" csv=packageserver id=Swhld namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:10.515565149Z time="2025-12-05T10:41:10Z" level=info msg="install strategy successful" csv=packageserver id=F0thP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:10.615360808Z time="2025-12-05T10:41:10Z" level=info msg="install strategy successful" csv=packageserver id=FyLbg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:10.714671295Z time="2025-12-05T10:41:10Z" level=info msg="install strategy successful" csv=packageserver id=3EbfJ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:10.981349983Z time="2025-12-05T10:41:10Z" level=info msg="install strategy successful" csv=packageserver id=47CVj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.081785638Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=mjovv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.093856909Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=4PVME namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.114279045Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=slmbS namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.217529913Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=SaYxY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.316407840Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=GR63J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.416735043Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=DjbAF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.514706986Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=bJQgo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.626891454Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=uek5A namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.719277023Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=8bgKN namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.818010385Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=UbDnK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:11.918454201Z time="2025-12-05T10:41:11Z" level=info msg="install strategy successful" csv=packageserver id=3d0q6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:12.015011148Z time="2025-12-05T10:41:12Z" level=info msg="install strategy successful" csv=packageserver id=ocdN3 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:12.114746176Z time="2025-12-05T10:41:12Z" level=info msg="install strategy successful" csv=packageserver id=CaP0b namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:12.214775632Z time="2025-12-05T10:41:12Z" level=info msg="install strategy successful" csv=packageserver id=AQuT8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:12.315913546Z time="2025-12-05T10:41:12Z" level=info msg="install strategy successful" csv=packageserver id=nnB8z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:12.415914370Z time="2025-12-05T10:41:12Z" level=info msg="install strategy successful" csv=packageserver id=8G3Wd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:12.514712984Z time="2025-12-05T10:41:12Z" level=info msg="install strategy successful" csv=packageserver id=+XQUf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:12.615067298Z time="2025-12-05T10:41:12Z" level=info msg="install strategy successful" csv=packageserver id=pywrQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:12.715205337Z time="2025-12-05T10:41:12Z" level=info msg="install strategy successful" csv=packageserver id=cjFRC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:12.815071518Z time="2025-12-05T10:41:12Z" level=info msg="install strategy successful" csv=packageserver id=s+sSM namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:12.914973951Z time="2025-12-05T10:41:12Z" level=info msg="install strategy successful" csv=packageserver id=O3lnx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:13.015556880Z time="2025-12-05T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=AIr/o namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:13.114130899Z time="2025-12-05T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=nbUk5 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:13.214504503Z time="2025-12-05T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=iPZ3y namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:13.318740337Z time="2025-12-05T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=AZTTF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:13.418227808Z time="2025-12-05T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=XVQj9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:13.518117860Z time="2025-12-05T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=Wah6d namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:13.615528199Z time="2025-12-05T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=n7Sow namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:13.715308658Z time="2025-12-05T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=VlbN7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:13.815672852Z time="2025-12-05T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=fn47g namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:13.958946681Z time="2025-12-05T10:41:13Z" level=info msg="install strategy successful" csv=packageserver id=DhAvH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:14.100834435Z time="2025-12-05T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=CJ4gw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:14.171993627Z time="2025-12-05T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=KS6L9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:14.235726268Z time="2025-12-05T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=skmhs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:14.317406501Z time="2025-12-05T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=4mKIK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:14.418159265Z time="2025-12-05T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=jn+GY namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:14.514634539Z time="2025-12-05T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=eeBv9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:14.614863441Z time="2025-12-05T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=NI/qz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:14.714923997Z time="2025-12-05T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=c5Szf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:14.814513651Z time="2025-12-05T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=JX4UC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:14.915314066Z time="2025-12-05T10:41:14Z" level=info msg="install strategy successful" csv=packageserver id=z5opT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:15.015144448Z time="2025-12-05T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=Q5NTP namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:15.115234324Z time="2025-12-05T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=YlPta namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:15.215736352Z time="2025-12-05T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=JwJmT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:15.315187523Z time="2025-12-05T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=lZrFg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:15.415832535Z time="2025-12-05T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=pKnVw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:15.519626317Z time="2025-12-05T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=HOwF9 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:15.614889180Z time="2025-12-05T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=Cxo/6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:15.716365632Z time="2025-12-05T10:41:15Z" level=info msg="install strategy successful" csv=packageserver id=JB4Aa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:19.407172376Z time="2025-12-05T10:41:19Z" level=info msg="install strategy successful" csv=packageserver id=56Pkt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:30.925225151Z time="2025-12-05T10:41:30Z" level=info msg="install strategy successful" csv=packageserver id=bRGBL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.031842837Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=LneBA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.129646125Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=JqV6t namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.147331950Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=DUlY0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.154153095Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=vHJ91 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.164482472Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=Q3QLw namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.171230235Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=WOyqa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.177726533Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=Nri+T namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.183907192Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=E/MXb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.191784615Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=tqpXI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.198290352Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=3iVQ6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.205259112Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=3gI2k namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.212155659Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=rOi/s namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.218690967Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=WzuDg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.225590775Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=5+fFs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.231937749Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=w25BE namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.237136743Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=rR1IF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.243521617Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=fsjRI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.279955135Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=D03TC namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.378998605Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=Ruxzc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.480164070Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=DTauc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.589102125Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=36/eq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.689319926Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=2Unoh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.779177580Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=/jwgp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.878289611Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=BvpND namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:31.979377575Z time="2025-12-05T10:41:31Z" level=info msg="install strategy successful" csv=packageserver id=eV46v namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:32.079430680Z time="2025-12-05T10:41:32Z" level=info msg="install strategy successful" csv=packageserver id=s6vhv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:32.180228046Z time="2025-12-05T10:41:32Z" level=info msg="install strategy successful" csv=packageserver id=hw78c namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:32.280376405Z time="2025-12-05T10:41:32Z" level=info msg="install strategy successful" csv=packageserver id=17ife namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:32.380775709Z time="2025-12-05T10:41:32Z" level=info msg="install strategy successful" csv=packageserver id=pYF/e namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:32.479332278Z time="2025-12-05T10:41:32Z" level=info msg="install strategy successful" csv=packageserver id=7TOpx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:32.580642866Z time="2025-12-05T10:41:32Z" level=info msg="install strategy successful" csv=packageserver id=TKTtD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:32.679701227Z time="2025-12-05T10:41:32Z" level=info msg="install strategy successful" csv=packageserver id=vdEqd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:32.779103846Z time="2025-12-05T10:41:32Z" level=info msg="install strategy successful" csv=packageserver id=+QEuL namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:32.878321791Z time="2025-12-05T10:41:32Z" level=info msg="install strategy successful" csv=packageserver id=6B+X0 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:35.344283506Z time="2025-12-05T10:41:35Z" level=info msg="install strategy successful" csv=packageserver id=xyThf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:36.814915193Z time="2025-12-05T10:41:36Z" level=info msg="install strategy successful" csv=packageserver id=eWyTV namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:36.835141694Z time="2025-12-05T10:41:36Z" level=info msg="install strategy successful" csv=packageserver id=6YJuu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:36.848685212Z time="2025-12-05T10:41:36Z" level=info msg="install strategy successful" csv=packageserver id=+uCly namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:36.858379632Z time="2025-12-05T10:41:36Z" level=info msg="install strategy successful" csv=packageserver id=Kw8Ld namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:36.867088577Z time="2025-12-05T10:41:36Z" level=info msg="install strategy successful" csv=packageserver id=i1irT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:36.878407388Z time="2025-12-05T10:41:36Z" level=info msg="install strategy successful" csv=packageserver id=3E1ai namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:36.885231113Z time="2025-12-05T10:41:36Z" level=info msg="install strategy successful" csv=packageserver id=wVyJ1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:36.893852896Z time="2025-12-05T10:41:36Z" level=info msg="install strategy successful" csv=packageserver id=0RMNs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2025-12-05T10:41:36.903712420Z time="2025-12-05T10:41:36Z" level=info msg="install strategy successful" csv=packageserver id=XbB/V namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000005441615114533341034570 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-fbc6455c4-mbm772025-12-05T10:41:04.310379743Z time="2025-12-05T10:41:04Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=iG8nC 2025-12-05T10:41:04.310379743Z time="2025-12-05T10:41:04Z" level=info msg="requeuing registry server sync based on polling interval 10m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=iG8nC 2025-12-05T10:41:04.310466215Z time="2025-12-05T10:41:04Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:04.310466215Z time="2025-12-05T10:41:04Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:04.498498797Z time="2025-12-05T10:41:04Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:04.498498797Z time="2025-12-05T10:41:04Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:04.707235852Z time="2025-12-05T10:41:04Z" level=info msg="No subscriptions were found in namespace openshift-operators" id=z1Au5 namespace=openshift-operators 2025-12-05T10:41:04.707235852Z time="2025-12-05T10:41:04Z" level=info msg="resolving sources" id=GgswA namespace=openshift-ovn-kubernetes 2025-12-05T10:41:04.707235852Z time="2025-12-05T10:41:04Z" level=info msg="checking if subscriptions need update" id=GgswA namespace=openshift-ovn-kubernetes 2025-12-05T10:41:04.713657297Z time="2025-12-05T10:41:04Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:04.713690498Z time="2025-12-05T10:41:04Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-6p8cq current-pod.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:04.713690498Z time="2025-12-05T10:41:04Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-6p8cq current-pod.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:04.713690498Z time="2025-12-05T10:41:04Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=EIg0G 2025-12-05T10:41:04.713690498Z time="2025-12-05T10:41:04Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:04.713700188Z time="2025-12-05T10:41:04Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:04.865622270Z time="2025-12-05T10:41:04Z" level=info msg="No subscriptions were found in namespace openshift-ovirt-infra" id=LenlS namespace=openshift-ovirt-infra 2025-12-05T10:41:04.865698102Z time="2025-12-05T10:41:04Z" level=info msg="resolving sources" id=Sa/Uy namespace=openshift-route-controller-manager 2025-12-05T10:41:04.865732103Z time="2025-12-05T10:41:04Z" level=info msg="checking if subscriptions need update" id=Sa/Uy namespace=openshift-route-controller-manager 2025-12-05T10:41:05.065602760Z time="2025-12-05T10:41:05Z" level=info msg="No subscriptions were found in namespace openshift-ovn-kubernetes" id=GgswA namespace=openshift-ovn-kubernetes 2025-12-05T10:41:05.065602760Z time="2025-12-05T10:41:05Z" level=info msg="resolving sources" id=/Utff namespace=openshift-service-ca 2025-12-05T10:41:05.065602760Z time="2025-12-05T10:41:05Z" level=info msg="checking if subscriptions need update" id=/Utff namespace=openshift-service-ca 2025-12-05T10:41:05.285468681Z time="2025-12-05T10:41:05Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:05.285829780Z time="2025-12-05T10:41:05Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-wk29h current-pod.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:05.285829780Z time="2025-12-05T10:41:05Z" level=info msg="No subscriptions were found in namespace openshift-route-controller-manager" id=Sa/Uy namespace=openshift-route-controller-manager 2025-12-05T10:41:05.285829780Z time="2025-12-05T10:41:05Z" level=info msg="resolving sources" id=JtC77 namespace=openshift-service-ca-operator 2025-12-05T10:41:05.285829780Z time="2025-12-05T10:41:05Z" level=info msg="checking if subscriptions need update" id=JtC77 namespace=openshift-service-ca-operator 2025-12-05T10:41:05.285829780Z time="2025-12-05T10:41:05Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-wk29h current-pod.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:05.285829780Z time="2025-12-05T10:41:05Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=BErZZ 2025-12-05T10:41:05.285829780Z time="2025-12-05T10:41:05Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:05.285829780Z time="2025-12-05T10:41:05Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:05.465994188Z time="2025-12-05T10:41:05Z" level=info msg="No subscriptions were found in namespace openshift-service-ca" id=/Utff namespace=openshift-service-ca 2025-12-05T10:41:05.465994188Z time="2025-12-05T10:41:05Z" level=info msg="resolving sources" id=rZd7V namespace=openshift-user-workload-monitoring 2025-12-05T10:41:05.465994188Z time="2025-12-05T10:41:05Z" level=info msg="checking if subscriptions need update" id=rZd7V namespace=openshift-user-workload-monitoring 2025-12-05T10:41:05.666208144Z time="2025-12-05T10:41:05Z" level=info msg="No subscriptions were found in namespace openshift-service-ca-operator" id=JtC77 namespace=openshift-service-ca-operator 2025-12-05T10:41:05.666247535Z time="2025-12-05T10:41:05Z" level=info msg="resolving sources" id=G3AmB namespace=openshift-vsphere-infra 2025-12-05T10:41:05.666247535Z time="2025-12-05T10:41:05Z" level=info msg="checking if subscriptions need update" id=G3AmB namespace=openshift-vsphere-infra 2025-12-05T10:41:05.865927856Z time="2025-12-05T10:41:05Z" level=info msg="No subscriptions were found in namespace openshift-user-workload-monitoring" id=rZd7V namespace=openshift-user-workload-monitoring 2025-12-05T10:41:05.865927856Z time="2025-12-05T10:41:05Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:05.866081260Z time="2025-12-05T10:41:05Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-6p8cq current-pod.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:05.866081260Z time="2025-12-05T10:41:05Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-6p8cq current-pod.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:05.866194513Z time="2025-12-05T10:41:05Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:05.866194513Z time="2025-12-05T10:41:05Z" level=info msg="requeuing registry server sync based on polling interval 10m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=EIg0G 2025-12-05T10:41:05.866292586Z time="2025-12-05T10:41:05Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:05.866303976Z time="2025-12-05T10:41:05Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:06.066588093Z time="2025-12-05T10:41:06Z" level=info msg="No subscriptions were found in namespace openshift-vsphere-infra" id=G3AmB namespace=openshift-vsphere-infra 2025-12-05T10:41:06.593298816Z time="2025-12-05T10:41:06Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:06.593395888Z time="2025-12-05T10:41:06Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-wk29h current-pod.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:06.593395888Z time="2025-12-05T10:41:06Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-wk29h current-pod.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:06.593552792Z time="2025-12-05T10:41:06Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:06.593552792Z time="2025-12-05T10:41:06Z" level=info msg="requeuing registry server sync based on polling interval 10m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=BErZZ 2025-12-05T10:41:06.593600703Z time="2025-12-05T10:41:06Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:06.593610484Z time="2025-12-05T10:41:06Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:06.665324610Z time="2025-12-05T10:41:06Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:06.665447333Z time="2025-12-05T10:41:06Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-djhk8 current-pod.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:06.665471404Z time="2025-12-05T10:41:06Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-djhk8 current-pod.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:06.665471404Z time="2025-12-05T10:41:06Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=G5TGf 2025-12-05T10:41:06.665481914Z time="2025-12-05T10:41:06Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:06.665491184Z time="2025-12-05T10:41:06Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:07.266185341Z time="2025-12-05T10:41:07Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:07.266282984Z time="2025-12-05T10:41:07Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-pqhfn current-pod.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:07.266282984Z time="2025-12-05T10:41:07Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-pqhfn current-pod.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:07.266321415Z time="2025-12-05T10:41:07Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=FnFBN 2025-12-05T10:41:07.266321415Z time="2025-12-05T10:41:07Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:07.266332445Z time="2025-12-05T10:41:07Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:07.866462918Z time="2025-12-05T10:41:07Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:07.866462918Z time="2025-12-05T10:41:07Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-djhk8 current-pod.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:07.866462918Z time="2025-12-05T10:41:07Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-djhk8 current-pod.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:07.866462918Z time="2025-12-05T10:41:07Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:07.866462918Z time="2025-12-05T10:41:07Z" level=info msg="requeuing registry server sync based on polling interval 10m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=G5TGf 2025-12-05T10:41:07.866462918Z time="2025-12-05T10:41:07Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:07.866462918Z time="2025-12-05T10:41:07Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:08.465813770Z time="2025-12-05T10:41:08Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:08.466678223Z time="2025-12-05T10:41:08Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-pqhfn current-pod.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:08.466678223Z time="2025-12-05T10:41:08Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-pqhfn current-pod.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:08.466678223Z time="2025-12-05T10:41:08Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:08.466678223Z time="2025-12-05T10:41:08Z" level=info msg="requeuing registry server sync based on polling interval 10m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=FnFBN 2025-12-05T10:41:08.466678223Z time="2025-12-05T10:41:08Z" level=info msg="syncing catalog source" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:08.466678223Z time="2025-12-05T10:41:08Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:08.666863438Z time="2025-12-05T10:41:08Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:08.666999701Z time="2025-12-05T10:41:08Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-6p8cq current-pod.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:08.667046732Z time="2025-12-05T10:41:08Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-6p8cq current-pod.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:08.667046732Z time="2025-12-05T10:41:08Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=uhrsC 2025-12-05T10:41:08.667057502Z time="2025-12-05T10:41:08Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:08.667066823Z time="2025-12-05T10:41:08Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:09.279519652Z time="2025-12-05T10:41:09Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:09.279519652Z time="2025-12-05T10:41:09Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-wk29h current-pod.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:09.279519652Z time="2025-12-05T10:41:09Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-wk29h current-pod.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:09.279519652Z time="2025-12-05T10:41:09Z" level=info msg="checked registry server health" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace health=true id=bgJSo 2025-12-05T10:41:09.279519652Z time="2025-12-05T10:41:09Z" level=info msg="registry state good" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:09.279519652Z time="2025-12-05T10:41:09Z" level=info msg="ensuring registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:09.868442517Z time="2025-12-05T10:41:09Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:09.868572380Z time="2025-12-05T10:41:09Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-6p8cq current-pod.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:09.868581890Z time="2025-12-05T10:41:09Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-6p8cq current-pod.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:09.868678462Z time="2025-12-05T10:41:09Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:09.868678462Z time="2025-12-05T10:41:09Z" level=info msg="requeuing registry server sync based on polling interval 10m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=uhrsC 2025-12-05T10:41:10.269176825Z time="2025-12-05T10:41:10Z" level=info msg="searching for current pods" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:10.269341029Z time="2025-12-05T10:41:10Z" level=info msg="evaluating current pod" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-wk29h current-pod.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:10.269341029Z time="2025-12-05T10:41:10Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-marketplace-wk29h current-pod.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:10.269471142Z time="2025-12-05T10:41:10Z" level=info msg="ensured registry server" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bgJSo 2025-12-05T10:41:10.269471142Z time="2025-12-05T10:41:10Z" level=info msg="requeuing registry server sync based on polling interval 10m0s" catalogsource.name=redhat-marketplace catalogsource.namespace=openshift-marketplace id=bgJSo config/pod/openshift-etcd-operator/logs/etcd-operator-5bf4d88c6f-n8t5c/etcd-operator_current.log0000640000000000000000000001055315114533341031211 0ustar00000000000000002025-12-05T10:40:27.361905438Z I1205 10:40:27.361321 1 cmd.go:253] Using service-serving-cert provided certificates 2025-12-05T10:40:27.361905438Z I1205 10:40:27.361474 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-05T10:40:27.361905438Z I1205 10:40:27.361678 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2025-12-05T10:40:27.364475894Z I1205 10:40:27.362109 1 observer_polling.go:159] Starting file observer 2025-12-05T10:40:27.364694280Z I1205 10:40:27.362193 1 observer_polling.go:159] Starting file observer 2025-12-05T10:40:27.396928120Z I1205 10:40:27.396695 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202511181540.p2.g0f87d4a.assembly.stream.el9-0f87d4a-0f87d4a7da8222d0a1fd21c3c8ced0f0ca3927fe 2025-12-05T10:40:28.810085416Z I1205 10:40:28.809984 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-05T10:40:28.810085416Z W1205 10:40:28.810036 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:40:28.810085416Z W1205 10:40:28.810044 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:40:28.810085416Z W1205 10:40:28.810051 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-05T10:40:28.810085416Z W1205 10:40:28.810059 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-05T10:40:28.810085416Z W1205 10:40:28.810064 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-05T10:40:28.810085416Z W1205 10:40:28.810068 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-05T10:40:28.815912867Z I1205 10:40:28.815879 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-05T10:40:28.815998969Z I1205 10:40:28.815983 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-05T10:40:28.816051521Z I1205 10:40:28.816039 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-05T10:40:28.816131993Z I1205 10:40:28.816096 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-05T10:40:28.833655653Z I1205 10:40:28.816266 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-05T10:40:28.833812867Z I1205 10:40:28.816393 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-05T10:40:28.834216798Z I1205 10:40:28.834193 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2025-12-05T10:40:28.834601678Z I1205 10:40:28.816483 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:40:28.834650339Z I1205 10:40:28.834637 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:40:28.834691790Z I1205 10:40:28.816514 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:40:28.834721011Z I1205 10:40:28.834710 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:40:28.917228785Z I1205 10:40:28.917166 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-05T10:40:28.935615379Z I1205 10:40:28.935571 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:40:28.935721981Z I1205 10:40:28.935614 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-5bf4d88c6f-n8t5c/etcd-operator_previous.log0000640000000000000000000004354015114533341031405 0ustar00000000000000002025-12-05T10:38:52.447578205Z I1205 10:38:52.447553 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2025-12-05T10:38:52.447578205Z I1205 10:38:52.447559 1 base_controller.go:181] Shutting down BootstrapTeardownController ... 2025-12-05T10:38:52.447578205Z I1205 10:38:52.447537 1 base_controller.go:113] All RevisionController workers have been terminated 2025-12-05T10:38:52.447599816Z I1205 10:38:52.447575 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2025-12-05T10:38:52.447599816Z I1205 10:38:52.447577 1 controller_manager.go:54] RevisionController controller terminated 2025-12-05T10:38:52.447599816Z I1205 10:38:52.447583 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2025-12-05T10:38:52.447599816Z I1205 10:38:52.447576 1 base_controller.go:113] All etcd-Node workers have been terminated 2025-12-05T10:38:52.447599816Z I1205 10:38:52.447497 1 base_controller.go:113] All etcd-operator-UnsupportedConfigOverrides workers have been terminated 2025-12-05T10:38:52.447623746Z I1205 10:38:52.447588 1 base_controller.go:123] Shutting down worker of MachineDeletionHooksController controller ... 2025-12-05T10:38:52.447623746Z I1205 10:38:52.447601 1 controller_manager.go:54] etcd-Node controller terminated 2025-12-05T10:38:52.447623746Z I1205 10:38:52.447602 1 controller_manager.go:54] etcd-operator-UnsupportedConfigOverrides controller terminated 2025-12-05T10:38:52.447675618Z I1205 10:38:52.447618 1 base_controller.go:113] All MachineDeletionHooksController workers have been terminated 2025-12-05T10:38:52.447675618Z I1205 10:38:52.447499 1 base_controller.go:181] Shutting down etcd-InstallerState ... 2025-12-05T10:38:52.447675618Z I1205 10:38:52.447479 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2025-12-05T10:38:52.447697508Z I1205 10:38:52.447672 1 base_controller.go:123] Shutting down worker of etcd-UnsupportedConfigOverrides controller ... 2025-12-05T10:38:52.447697508Z I1205 10:38:52.447504 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2025-12-05T10:38:52.447697508Z I1205 10:38:52.447675 1 base_controller.go:113] All GuardController workers have been terminated 2025-12-05T10:38:52.447697508Z I1205 10:38:52.447687 1 base_controller.go:113] All etcd-UnsupportedConfigOverrides workers have been terminated 2025-12-05T10:38:52.447697508Z I1205 10:38:52.447689 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2025-12-05T10:38:52.447720639Z I1205 10:38:52.447696 1 controller_manager.go:54] GuardController controller terminated 2025-12-05T10:38:52.447720639Z I1205 10:38:52.447702 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2025-12-05T10:38:52.447741029Z I1205 10:38:52.447725 1 base_controller.go:113] All PruneController workers have been terminated 2025-12-05T10:38:52.447741029Z I1205 10:38:52.447465 1 base_controller.go:123] Shutting down worker of StatusSyncer_etcd controller ... 2025-12-05T10:38:52.447760560Z I1205 10:38:52.447737 1 controller_manager.go:54] PruneController controller terminated 2025-12-05T10:38:52.447779700Z I1205 10:38:52.447700 1 controller_manager.go:54] LoggingSyncer controller terminated 2025-12-05T10:38:52.447779700Z I1205 10:38:52.447760 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2025-12-05T10:38:52.447800541Z I1205 10:38:52.447557 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2025-12-05T10:38:52.447800541Z I1205 10:38:52.447794 1 controller_manager.go:54] MissingStaticPodController controller terminated 2025-12-05T10:38:52.447861902Z E1205 10:38:52.447570 1 base_controller.go:279] "Unhandled Error" err="etcd-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/pods?labelSelector=app%3Dinstaller\": context canceled" 2025-12-05T10:38:52.447861902Z I1205 10:38:52.447583 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2025-12-05T10:38:52.447888173Z I1205 10:38:52.447874 1 base_controller.go:113] All ConfigObserver workers have been terminated 2025-12-05T10:38:52.447918944Z I1205 10:38:52.447621 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2025-12-05T10:38:52.448194451Z E1205 10:38:52.448129 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-scripts\": context canceled" 2025-12-05T10:38:52.448588392Z E1205 10:38:52.448531 1 base_controller.go:279] "Unhandled Error" err="etcd-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"etcd-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:38:52.448637533Z I1205 10:38:52.448575 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"d5b81d28-e788-441c-9ad8-7ca98690d105", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2025-12-05T10:38:52.448637533Z I1205 10:38:52.448620 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2025-12-05T10:38:52.448654934Z I1205 10:38:52.448642 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2025-12-05T10:38:52.448727655Z I1205 10:38:52.448690 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2025-12-05T10:38:52.448727655Z I1205 10:38:52.448717 1 base_controller.go:113] All TargetConfigController workers have been terminated 2025-12-05T10:38:52.448840768Z I1205 10:38:52.448804 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2025-12-05T10:38:52.448967952Z I1205 10:38:52.448931 1 base_controller.go:123] Shutting down worker of etcd-InstallerState controller ... 2025-12-05T10:38:52.449065244Z I1205 10:38:52.449038 1 base_controller.go:113] All etcd-InstallerState workers have been terminated 2025-12-05T10:38:52.449118745Z I1205 10:38:52.449100 1 controller_manager.go:54] etcd-InstallerState controller terminated 2025-12-05T10:38:52.449174557Z E1205 10:38:52.449105 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd\": context canceled, \"etcd/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:38:52.449224738Z I1205 10:38:52.449180 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2025-12-05T10:38:52.449278069Z I1205 10:38:52.449259 1 base_controller.go:113] All ScriptController workers have been terminated 2025-12-05T10:38:52.449330111Z I1205 10:38:52.449292 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2025-12-05T10:38:52.449473784Z I1205 10:38:52.449414 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2025-12-05T10:38:52.449581517Z E1205 10:38:52.449520 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:38:52.449610528Z E1205 10:38:52.449524 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-etcd-operator/leases/openshift-cluster-etcd-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2025-12-05T10:38:52.449610528Z I1205 10:38:52.449592 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2025-12-05T10:38:52.449671860Z I1205 10:38:52.449644 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2025-12-05T10:38:52.449689201Z I1205 10:38:52.449629 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:38:52.449838005Z E1205 10:38:52.449793 1 leaderelection.go:436] error retrieving resource lock openshift-etcd-operator/openshift-cluster-etcd-operator-lock: client rate limiter Wait returned an error: context canceled 2025-12-05T10:38:52.449838005Z I1205 10:38:52.449807 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2025-12-05T10:38:52.449905006Z I1205 10:38:52.449873 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2025-12-05T10:38:52.449905006Z I1205 10:38:52.449891 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2025-12-05T10:38:52.450122502Z I1205 10:38:52.450087 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1453751507/tls.crt::/tmp/serving-cert-1453751507/tls.key" 2025-12-05T10:38:52.450191614Z I1205 10:38:52.450158 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2025-12-05T10:38:52.450291956Z I1205 10:38:52.449823 1 leaderelection.go:297] failed to renew lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock: timed out waiting for the condition 2025-12-05T10:38:52.450349378Z I1205 10:38:52.450319 1 secure_serving.go:258] Stopped listening on [::]:8443 2025-12-05T10:38:52.450349378Z I1205 10:38:52.450339 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2025-12-05T10:38:52.450369148Z I1205 10:38:52.450356 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2025-12-05T10:38:52.450369148Z I1205 10:38:52.450363 1 builder.go:335] server exited 2025-12-05T10:38:52.450403939Z I1205 10:38:52.450380 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2025-12-05T10:38:52.450403939Z I1205 10:38:52.450389 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2025-12-05T10:38:52.450511082Z I1205 10:38:52.449568 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:38:52.450640335Z I1205 10:38:52.450615 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2025-12-05T10:38:52.450733307Z I1205 10:38:52.450705 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2025-12-05T10:38:52.450799839Z I1205 10:38:52.450775 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2025-12-05T10:38:53.478368246Z I1205 10:38:53.478311 1 etcdcli_pool.go:70] creating a new cached client 2025-12-05T10:38:56.810521489Z I1205 10:38:56.810453 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="6b381e7459047bf9e808e9134c97ac9e9e3cd3531d5fca2906cbe0d1500935de") 2025-12-05T10:38:56.810521489Z I1205 10:38:56.810484 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2025-12-05T10:38:56.810562260Z I1205 10:38:56.810529 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="5b782fb075b0a78348210eb772a080fddb36bd120f6e6dfd871f448132ff43e0") 2025-12-05T10:38:56.810562260Z I1205 10:38:56.810535 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2025-12-05T10:38:56.810611141Z I1205 10:38:56.810583 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="198e6641ac83e365bb3c0884fd64bde534e71081012d978de68d815e3c146a9b") 2025-12-05T10:38:56.810611141Z I1205 10:38:56.810601 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2025-12-05T10:38:56.810665113Z I1205 10:38:56.810640 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="d5b76ead2f8dffbd67da1feff62dac6345760559abcfcc1293cec02c6146fd07") 2025-12-05T10:38:56.810665113Z I1205 10:38:56.810651 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2025-12-05T10:38:56.810723024Z I1205 10:38:56.810699 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="829ac2e22fbb6f0d6fbeb3d2b08903485b6fbacc73e6d8716a4d1c560499f432") 2025-12-05T10:38:56.810723024Z I1205 10:38:56.810709 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2025-12-05T10:38:56.810770705Z I1205 10:38:56.810751 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="a5effbc29245b364483edde20cc90d461281f113f423887c5e22a50acdbb0da1") 2025-12-05T10:38:56.810770705Z I1205 10:38:56.810761 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2025-12-05T10:38:57.444278495Z I1205 10:38:57.444172 1 observer_polling.go:162] Shutting down file observer 2025-12-05T10:39:04.964039134Z W1205 10:39:04.963970 1 etcdcli_pool.go:73] could not create a new cached client after 1 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2025-12-05T10:39:05.905863028Z W1205 10:39:05.905764 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2025-12-05T10:39:05.906210387Z E1205 10:39:05.906161 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: failed to get member list: giving up getting a cached client after 3 tries" 2025-12-05T10:39:05.907397488Z I1205 10:39:05.907368 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2025-12-05T10:39:05.907492540Z I1205 10:39:05.907477 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2025-12-05T10:39:08.479493291Z W1205 10:39:08.479413 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2025-12-05T10:39:08.481122343Z E1205 10:39:08.481061 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberController reconciliation failed: could not get list of unhealthy members: giving up getting a cached client after 3 tries" 2025-12-05T10:39:08.482464718Z I1205 10:39:08.482357 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2025-12-05T10:39:08.482464718Z I1205 10:39:08.482417 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2025-12-05T10:39:08.964143116Z I1205 10:39:08.964072 1 etcdcli_pool.go:70] creating a new cached client 2025-12-05T10:39:23.966959930Z W1205 10:39:23.966845 1 etcdcli_pool.go:73] could not create a new cached client after 2 tries, trying again. Err: failed to make etcd client for endpoints [https://192.168.32.10:2379]: context deadline exceeded 2025-12-05T10:39:23.969583108Z E1205 10:39:23.969513 1 base_controller.go:279] "Unhandled Error" err="ClusterMemberRemovalController reconciliation failed: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries" 2025-12-05T10:39:23.971412176Z I1205 10:39:23.971348 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2025-12-05T10:39:23.971474078Z I1205 10:39:23.971409 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2025-12-05T10:39:26.453796113Z E1205 10:39:26.453171 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2025-12-05T10:39:26.453796113Z W1205 10:39:26.453220 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c.json0000640000000000000000000001576315114533341024133 0ustar0000000000000000{"metadata":{"name":"etcd-operator-5bf4d88c6f-n8t5c","generateName":"etcd-operator-5bf4d88c6f-","namespace":"openshift-etcd-operator","uid":"f7a08359-0379-4364-8b0c-ddb58ff605f4","resourceVersion":"8807","creationTimestamp":"2025-12-05T10:35:54Z","labels":{"app":"etcd-operator","pod-template-hash":"5bf4d88c6f"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-5bf4d88c6f","uid":"44a87750-0a3a-42ff-b498-8f9054ce7750","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-twh85","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.29"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.29"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-twh85","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2025-12-05T10:37:08Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2025-12-05T10:40:27Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-05T10:37:36Z","finishedAt":"2025-12-05T10:39:26Z","containerID":"cri-o://7f719d929cd8f822ace129247877e00bae5a9457d73d9da2566b48784c2ee8fc"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","containerID":"cri-o://4ebfc00b497d18970f0f221db9978daf3b3a56e51ef76dfd9c99c73031c71b97","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-twh85","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000003313415114533341034154 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-5b9fd577f8-6sxcx2025-12-05T10:38:15.277985237Z W1205 10:38:15.277845 1 cmd.go:257] Using insecure, self-signed certificates 2025-12-05T10:38:15.278390218Z I1205 10:38:15.278351 1 crypto.go:601] Generating new CA for check-endpoints-signer@1764931095 cert, and key in /tmp/serving-cert-1377383677/serving-signer.crt, /tmp/serving-cert-1377383677/serving-signer.key 2025-12-05T10:38:15.739416633Z I1205 10:38:15.739346 1 observer_polling.go:159] Starting file observer 2025-12-05T10:38:15.755571819Z I1205 10:38:15.755504 1 builder.go:304] check-endpoints version 4.18.0-202511181540.p2.gbac8a7c.assembly.stream.el9-bac8a7c-bac8a7c99c2e8562a05b784c8fe4f8ecd91eecdf 2025-12-05T10:38:15.758667916Z I1205 10:38:15.758617 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-1377383677/tls.crt::/tmp/serving-cert-1377383677/tls.key" 2025-12-05T10:38:16.220270127Z I1205 10:38:16.220202 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2025-12-05T10:38:16.221922693Z I1205 10:38:16.221870 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2025-12-05T10:38:16.221922693Z I1205 10:38:16.221895 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2025-12-05T10:38:16.221922693Z I1205 10:38:16.221916 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2025-12-05T10:38:16.221945674Z I1205 10:38:16.221923 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2025-12-05T10:38:16.225998219Z I1205 10:38:16.225934 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-05T10:38:16.225998219Z I1205 10:38:16.225963 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2025-12-05T10:38:16.225998219Z W1205 10:38:16.225970 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:38:16.225998219Z W1205 10:38:16.225977 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:38:16.225998219Z W1205 10:38:16.225983 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-05T10:38:16.225998219Z W1205 10:38:16.225987 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-05T10:38:16.225998219Z W1205 10:38:16.225991 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-05T10:38:16.226023539Z W1205 10:38:16.225996 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-05T10:38:16.228723926Z I1205 10:38:16.228665 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-05T10:38:16.228723926Z I1205 10:38:16.228682 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:38:16.228723926Z I1205 10:38:16.228718 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:38:16.228748537Z I1205 10:38:16.228720 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-05T10:38:16.228762997Z I1205 10:38:16.228750 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:38:16.228773317Z I1205 10:38:16.228763 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:38:16.228800998Z I1205 10:38:16.228784 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-05T10:38:16.228800998Z I1205 10:38:16.228794 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-05T10:38:16.229007084Z I1205 10:38:16.228966 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1377383677/tls.crt::/tmp/serving-cert-1377383677/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1764931095\" (2025-12-05 10:38:14 +0000 UTC to 2026-01-04 10:38:15 +0000 UTC (now=2025-12-05 10:38:16.228938492 +0000 UTC))" 2025-12-05T10:38:16.229154798Z I1205 10:38:16.229113 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764931096\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764931096\" (2025-12-05 09:38:15 +0000 UTC to 2026-12-05 09:38:15 +0000 UTC (now=2025-12-05 10:38:16.229089116 +0000 UTC))" 2025-12-05T10:38:16.229154798Z I1205 10:38:16.229130 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-1377383677/tls.crt::/tmp/serving-cert-1377383677/tls.key" 2025-12-05T10:38:16.229154798Z I1205 10:38:16.229139 1 secure_serving.go:213] Serving securely on [::]:17698 2025-12-05T10:38:16.229180048Z I1205 10:38:16.229162 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2025-12-05T10:38:16.229189979Z I1205 10:38:16.229177 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-05T10:38:16.229734925Z I1205 10:38:16.229682 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2025-12-05T10:38:16.231050742Z I1205 10:38:16.231003 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-05T10:38:16.231118514Z I1205 10:38:16.231016 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-05T10:38:16.231569176Z I1205 10:38:16.231520 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-05T10:38:16.331431209Z I1205 10:38:16.331361 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:38:16.331558004Z I1205 10:38:16.331532 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:38:16.331558004Z I1205 10:38:16.331543 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-05T10:38:16.331832041Z I1205 10:38:16.331789 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-05 10:20:50 +0000 UTC to 2035-12-03 10:20:50 +0000 UTC (now=2025-12-05 10:38:16.331759559 +0000 UTC))" 2025-12-05T10:38:16.331832041Z I1205 10:38:16.331826 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2025-12-06 10:27:25 +0000 UTC (now=2025-12-05 10:38:16.331811941 +0000 UTC))" 2025-12-05T10:38:16.331855532Z I1205 10:38:16.331844 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2026-12-05 10:27:25 +0000 UTC (now=2025-12-05 10:38:16.331833321 +0000 UTC))" 2025-12-05T10:38:16.331879913Z I1205 10:38:16.331861 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2026-12-05 10:27:25 +0000 UTC (now=2025-12-05 10:38:16.331850172 +0000 UTC))" 2025-12-05T10:38:16.331887993Z I1205 10:38:16.331881 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-05 10:27:22 +0000 UTC to 2035-12-03 10:27:22 +0000 UTC (now=2025-12-05 10:38:16.331868402 +0000 UTC))" 2025-12-05T10:38:16.332064548Z I1205 10:38:16.332034 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1377383677/tls.crt::/tmp/serving-cert-1377383677/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1764931095\" (2025-12-05 10:38:14 +0000 UTC to 2026-01-04 10:38:15 +0000 UTC (now=2025-12-05 10:38:16.332017506 +0000 UTC))" 2025-12-05T10:38:16.332201671Z I1205 10:38:16.332171 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764931096\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764931096\" (2025-12-05 09:38:15 +0000 UTC to 2026-12-05 09:38:15 +0000 UTC (now=2025-12-05 10:38:16.33215452 +0000 UTC))" 2025-12-05T10:38:16.332318625Z I1205 10:38:16.332287 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-05 10:20:50 +0000 UTC to 2035-12-03 10:20:50 +0000 UTC (now=2025-12-05 10:38:16.332272883 +0000 UTC))" 2025-12-05T10:38:16.332318625Z I1205 10:38:16.332314 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2025-12-06 10:27:25 +0000 UTC (now=2025-12-05 10:38:16.332303604 +0000 UTC))" 2025-12-05T10:38:16.332350016Z I1205 10:38:16.332331 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2026-12-05 10:27:25 +0000 UTC (now=2025-12-05 10:38:16.332319585 +0000 UTC))" 2025-12-05T10:38:16.332359716Z I1205 10:38:16.332353 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2026-12-05 10:27:25 +0000 UTC (now=2025-12-05 10:38:16.332341695 +0000 UTC))" 2025-12-05T10:38:16.332395087Z I1205 10:38:16.332370 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-05 10:27:22 +0000 UTC to 2035-12-03 10:27:22 +0000 UTC (now=2025-12-05 10:38:16.332358646 +0000 UTC))" 2025-12-05T10:38:16.332395087Z I1205 10:38:16.332390 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-05 10:27:23 +0000 UTC to 2025-12-06 10:27:23 +0000 UTC (now=2025-12-05 10:38:16.332379786 +0000 UTC))" 2025-12-05T10:38:16.332569412Z I1205 10:38:16.332536 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1377383677/tls.crt::/tmp/serving-cert-1377383677/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1764931095\" (2025-12-05 10:38:14 +0000 UTC to 2026-01-04 10:38:15 +0000 UTC (now=2025-12-05 10:38:16.33252161 +0000 UTC))" 2025-12-05T10:38:16.332695325Z I1205 10:38:16.332667 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764931096\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764931096\" (2025-12-05 09:38:15 +0000 UTC to 2026-12-05 09:38:15 +0000 UTC (now=2025-12-05 10:38:16.332651794 +0000 UTC))" 2025-12-05T10:38:16.550183634Z I1205 10:38:16.550135 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-05T10:38:16.630667079Z I1205 10:38:16.630570 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2025-12-05T10:38:16.630667079Z I1205 10:38:16.630614 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-5b9fd577f8-6sxcx/openshift-apiserver_current.log0000640000000000000000000011723015114533341031157 0ustar00000000000000002025-12-05T10:41:24.810928456Z E1205 10:41:24.810893 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.811005938Z E1205 10:41:24.810972 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.811171632Z E1205 10:41:24.811125 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.811171632Z E1205 10:41:24.811143 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.812579898Z E1205 10:41:24.811193 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.812579898Z E1205 10:41:24.811400 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.812579898Z E1205 10:41:24.811608 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.856167260Z E1205 10:41:24.855950 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.856167260Z E1205 10:41:24.856037 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.856363975Z E1205 10:41:24.856308 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.856503719Z E1205 10:41:24.856470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:24.856530609Z E1205 10:41:24.856483 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.293548063Z E1205 10:41:25.293489 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.293548063Z E1205 10:41:25.293497 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.293906862Z E1205 10:41:25.293869 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.293922502Z E1205 10:41:25.293907 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.294317382Z E1205 10:41:25.294273 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.595814145Z E1205 10:41:25.595735 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.596172395Z E1205 10:41:25.596139 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.596404701Z E1205 10:41:25.596374 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.596739509Z E1205 10:41:25.596663 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.596922054Z E1205 10:41:25.596896 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.826479975Z E1205 10:41:25.826397 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.826532676Z E1205 10:41:25.826511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.826628268Z E1205 10:41:25.826412 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.826717571Z E1205 10:41:25.826641 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:25.826717571Z E1205 10:41:25.826688 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.251332547Z E1205 10:41:32.251247 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.251832449Z E1205 10:41:32.251677 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.251832449Z E1205 10:41:32.251823 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.253955944Z E1205 10:41:32.253888 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.254044137Z E1205 10:41:32.254007 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.254264502Z E1205 10:41:32.254012 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.255484064Z E1205 10:41:32.255434 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.260763280Z E1205 10:41:32.260725 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.261059357Z E1205 10:41:32.261024 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.261128209Z E1205 10:41:32.261084 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.261239022Z E1205 10:41:32.261206 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.261403966Z E1205 10:41:32.261367 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.261403966Z E1205 10:41:32.261383 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.261666673Z E1205 10:41:32.261633 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.261732414Z E1205 10:41:32.261690 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.261847927Z E1205 10:41:32.261815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.261917239Z E1205 10:41:32.261887 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.262022242Z E1205 10:41:32.261990 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.262098564Z E1205 10:41:32.262076 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.262226428Z E1205 10:41:32.262195 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.262346071Z E1205 10:41:32.262321 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.262434793Z E1205 10:41:32.262405 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.262512105Z E1205 10:41:32.262320 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.269006402Z E1205 10:41:32.268927 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.269276569Z E1205 10:41:32.269240 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.269521405Z E1205 10:41:32.269481 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.269741291Z E1205 10:41:32.269715 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.269976297Z E1205 10:41:32.269952 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.270012507Z E1205 10:41:32.269983 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.270012507Z E1205 10:41:32.270002 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.270061599Z E1205 10:41:32.270039 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.270287214Z E1205 10:41:32.270252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.270287214Z E1205 10:41:32.270262 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.279824780Z E1205 10:41:32.279765 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.281349069Z E1205 10:41:32.279868 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.281349069Z E1205 10:41:32.279942 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.281349069Z E1205 10:41:32.279968 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.281349069Z E1205 10:41:32.280031 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.281349069Z E1205 10:41:32.279771 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.281349069Z E1205 10:41:32.280106 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.282898299Z E1205 10:41:32.282473 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.282898299Z E1205 10:41:32.282500 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.282898299Z E1205 10:41:32.282660 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.332774344Z E1205 10:41:32.332684 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.332774344Z E1205 10:41:32.332723 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.337572478Z E1205 10:41:32.337511 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.337614839Z E1205 10:41:32.337578 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.339116867Z E1205 10:41:32.339062 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.345211044Z E1205 10:41:32.345164 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.349906064Z E1205 10:41:32.349864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.349960016Z E1205 10:41:32.349927 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.354817571Z E1205 10:41:32.354770 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.354817571Z E1205 10:41:32.354807 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.378906882Z E1205 10:41:32.377480 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.378906882Z E1205 10:41:32.377480 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.384641789Z E1205 10:41:32.384042 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.384641789Z E1205 10:41:32.384213 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.390233593Z E1205 10:41:32.390173 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.395761786Z E1205 10:41:32.395711 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.395902699Z E1205 10:41:32.395858 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:32.402097219Z E1205 10:41:32.402010 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:33.269535214Z E1205 10:41:33.267609 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:33.269535214Z E1205 10:41:33.267609 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.294836884Z E1205 10:41:34.294755 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.294891035Z E1205 10:41:34.294829 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.294919776Z E1205 10:41:34.294755 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.295013819Z E1205 10:41:34.294966 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.296922708Z E1205 10:41:34.296864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.468878576Z E1205 10:41:34.468781 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.468987119Z E1205 10:41:34.468952 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.468987119Z E1205 10:41:34.468967 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.468998449Z E1205 10:41:34.468967 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:34.469104832Z E1205 10:41:34.468953 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" openshift-apiserver-operator_current.log0000640000000000000000000001001315114533341040340 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-7bf7f6b755-hdjv72025-12-05T10:40:27.343148965Z I1205 10:40:27.340957 1 cmd.go:253] Using service-serving-cert provided certificates 2025-12-05T10:40:27.343148965Z I1205 10:40:27.341102 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-05T10:40:27.343148965Z I1205 10:40:27.342388 1 observer_polling.go:159] Starting file observer 2025-12-05T10:40:27.384330745Z I1205 10:40:27.382851 1 builder.go:304] openshift-apiserver-operator version - 2025-12-05T10:40:28.818642146Z I1205 10:40:28.818184 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-05T10:40:28.818642146Z W1205 10:40:28.818235 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:40:28.818642146Z W1205 10:40:28.818244 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:40:28.818642146Z W1205 10:40:28.818252 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-05T10:40:28.818642146Z W1205 10:40:28.818286 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-05T10:40:28.818642146Z W1205 10:40:28.818293 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-05T10:40:28.818642146Z W1205 10:40:28.818299 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-05T10:40:28.819482608Z I1205 10:40:28.819064 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-05T10:40:28.819482608Z I1205 10:40:28.819365 1 leaderelection.go:254] attempting to acquire leader lease openshift-apiserver-operator/openshift-apiserver-operator-lock... 2025-12-05T10:40:28.828492690Z I1205 10:40:28.824889 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-05T10:40:28.828492690Z I1205 10:40:28.824944 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-05T10:40:28.828492690Z I1205 10:40:28.824967 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-05T10:40:28.828492690Z I1205 10:40:28.824997 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-05T10:40:28.828492690Z I1205 10:40:28.825109 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-05T10:40:28.828492690Z I1205 10:40:28.825197 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:40:28.828492690Z I1205 10:40:28.825204 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:40:28.828492690Z I1205 10:40:28.825217 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:40:28.828492690Z I1205 10:40:28.825223 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:40:28.925868818Z I1205 10:40:28.925650 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:40:28.925868818Z I1205 10:40:28.925724 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:40:28.925868818Z I1205 10:40:28.925733 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController openshift-apiserver-operator_previous.log0000640000000000000000000004317215114533341040546 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-7bf7f6b755-hdjv72025-12-05T10:38:30.183901632Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/security.openshift.io/v1: 401 2025-12-05T10:38:30.183901632Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/template.openshift.io/v1: 401 2025-12-05T10:38:30.183901632Z > 2025-12-05T10:38:31.985404684Z E1205 10:38:31.985339 1 base_controller.go:279] "Unhandled Error" err=< 2025-12-05T10:38:31.985404684Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/apps.openshift.io/v1: 401 2025-12-05T10:38:31.985404684Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: 401 2025-12-05T10:38:31.985404684Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/build.openshift.io/v1: 401 2025-12-05T10:38:31.985404684Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/image.openshift.io/v1: 401 2025-12-05T10:38:31.985404684Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/project.openshift.io/v1: 401 2025-12-05T10:38:31.985404684Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/quota.openshift.io/v1: 401 2025-12-05T10:38:31.985404684Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/route.openshift.io/v1: 401 2025-12-05T10:38:31.985404684Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/security.openshift.io/v1: 401 2025-12-05T10:38:31.985404684Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/template.openshift.io/v1: 401 2025-12-05T10:38:31.985404684Z > 2025-12-05T10:38:57.281334213Z I1205 10:38:57.281264 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="70238b97506601a5794ce32a6b8e076ec9409b9572d0c8645d97122f7c18a89a") 2025-12-05T10:38:57.281522947Z W1205 10:38:57.281504 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2025-12-05T10:38:57.281632101Z I1205 10:38:57.281615 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="329b5ac7491db87e538ea1bb32cf8f7e8b2114f5b159ebc2c5e030bc7c51e933") 2025-12-05T10:38:57.281751114Z I1205 10:38:57.281730 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2025-12-05T10:38:57.281906508Z I1205 10:38:57.281884 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2025-12-05T10:38:57.282043292Z I1205 10:38:57.282027 1 secure_serving.go:258] Stopped listening on [::]:8443 2025-12-05T10:38:57.282118804Z I1205 10:38:57.282041 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2025-12-05T10:38:57.282118804Z I1205 10:38:57.282079 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2025-12-05T10:38:57.282160745Z I1205 10:38:57.282133 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2025-12-05T10:38:57.282745529Z I1205 10:38:57.282478 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2025-12-05T10:38:57.282790481Z I1205 10:38:57.282073 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2025-12-05T10:38:57.282801771Z I1205 10:38:57.282318 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1718145470/tls.crt::/tmp/serving-cert-1718145470/tls.key" 2025-12-05T10:38:57.282865333Z E1205 10:38:57.282831 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-apiserver-operator/leases/openshift-apiserver-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2025-12-05T10:38:57.282957196Z I1205 10:38:57.282928 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2025-12-05T10:38:57.283018927Z E1205 10:38:57.283000 1 leaderelection.go:436] error retrieving resource lock openshift-apiserver-operator/openshift-apiserver-operator-lock: client rate limiter Wait returned an error: context canceled 2025-12-05T10:38:57.283064639Z I1205 10:38:57.283051 1 leaderelection.go:297] failed to renew lease openshift-apiserver-operator/openshift-apiserver-operator-lock: timed out waiting for the condition 2025-12-05T10:38:57.283136620Z I1205 10:38:57.283093 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:38:57.283184042Z I1205 10:38:57.283157 1 base_controller.go:181] Shutting down openshift-apiserver ... 2025-12-05T10:38:57.283213342Z I1205 10:38:57.283179 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2025-12-05T10:38:57.283223613Z I1205 10:38:57.283213 1 builder.go:335] server exited 2025-12-05T10:38:57.283223613Z I1205 10:38:57.283193 1 base_controller.go:181] Shutting down ConnectivityCheckController ... 2025-12-05T10:38:57.283235353Z I1205 10:38:57.283201 1 base_controller.go:181] Shutting down StatusSyncer_openshift-apiserver ... 2025-12-05T10:38:57.283259474Z I1205 10:38:57.283231 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionMigration ... 2025-12-05T10:38:57.283259474Z I1205 10:38:57.283213 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionKey ... 2025-12-05T10:38:57.283259474Z I1205 10:38:57.283204 1 base_controller.go:181] Shutting down APIServerStaticResources-StaticResources ... 2025-12-05T10:38:57.283259474Z I1205 10:38:57.283237 1 base_controller.go:159] All StatusSyncer_openshift-apiserver post start hooks have been terminated 2025-12-05T10:38:57.283272314Z I1205 10:38:57.283257 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionState ... 2025-12-05T10:38:57.283272314Z I1205 10:38:57.283260 1 base_controller.go:181] Shutting down LoggingSyncer ... 2025-12-05T10:38:57.283272314Z I1205 10:38:57.283262 1 base_controller.go:123] Shutting down worker of StatusSyncer_openshift-apiserver controller ... 2025-12-05T10:38:57.283282234Z I1205 10:38:57.283275 1 base_controller.go:113] All StatusSyncer_openshift-apiserver workers have been terminated 2025-12-05T10:38:57.283291554Z I1205 10:38:57.283279 1 base_controller.go:181] Shutting down openshift-apiserver-RemoveStaleConditions ... 2025-12-05T10:38:57.283300835Z I1205 10:38:57.283289 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2025-12-05T10:38:57.283300835Z I1205 10:38:57.283296 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2025-12-05T10:38:57.283310465Z I1205 10:38:57.283300 1 base_controller.go:123] Shutting down worker of openshift-apiserver-RemoveStaleConditions controller ... 2025-12-05T10:38:57.283320545Z I1205 10:38:57.283309 1 base_controller.go:181] Shutting down openshift-apiserver-UnsupportedConfigOverrides ... 2025-12-05T10:38:57.283320545Z I1205 10:38:57.283311 1 base_controller.go:113] All openshift-apiserver-RemoveStaleConditions workers have been terminated 2025-12-05T10:38:57.283320545Z I1205 10:38:57.283304 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionCondition ... 2025-12-05T10:38:57.283330945Z I1205 10:38:57.283320 1 base_controller.go:123] Shutting down worker of openshift-apiserver-UnsupportedConfigOverrides controller ... 2025-12-05T10:38:57.283330945Z I1205 10:38:57.283315 1 base_controller.go:181] Shutting down openshift-apiserver-EncryptionPrune ... 2025-12-05T10:38:57.283340616Z I1205 10:38:57.283329 1 base_controller.go:181] Shutting down ConfigObserver ... 2025-12-05T10:38:57.283340616Z I1205 10:38:57.283330 1 base_controller.go:113] All openshift-apiserver-UnsupportedConfigOverrides workers have been terminated 2025-12-05T10:38:57.283350356Z I1205 10:38:57.283340 1 base_controller.go:181] Shutting down OpenShiftAPIServer-WorkloadWorkloadController ... 2025-12-05T10:38:57.283350356Z I1205 10:38:57.283344 1 base_controller.go:123] Shutting down worker of openshift-apiserver controller ... 2025-12-05T10:38:57.283359836Z I1205 10:38:57.283351 1 base_controller.go:123] Shutting down worker of ConnectivityCheckController controller ... 2025-12-05T10:38:57.283369106Z I1205 10:38:57.283362 1 base_controller.go:113] All ConnectivityCheckController workers have been terminated 2025-12-05T10:38:57.283380407Z I1205 10:38:57.283374 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionKey controller ... 2025-12-05T10:38:57.283389357Z I1205 10:38:57.283381 1 base_controller.go:113] All openshift-apiserver-EncryptionKey workers have been terminated 2025-12-05T10:38:57.283398687Z I1205 10:38:57.283390 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionMigration controller ... 2025-12-05T10:38:57.283413477Z I1205 10:38:57.283396 1 base_controller.go:113] All openshift-apiserver-EncryptionMigration workers have been terminated 2025-12-05T10:38:57.283413477Z I1205 10:38:57.283409 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionState controller ... 2025-12-05T10:38:57.283452198Z I1205 10:38:57.283415 1 base_controller.go:113] All openshift-apiserver-EncryptionState workers have been terminated 2025-12-05T10:38:57.283452198Z I1205 10:38:57.283353 1 base_controller.go:113] All openshift-apiserver workers have been terminated 2025-12-05T10:38:57.283452198Z I1205 10:38:57.283417 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:38:57.283535521Z I1205 10:38:57.283508 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2025-12-05T10:38:57.283547501Z I1205 10:38:57.283532 1 base_controller.go:181] Shutting down RevisionController ... 2025-12-05T10:38:57.283582102Z I1205 10:38:57.283558 1 base_controller.go:181] Shutting down auditPolicyController ... 2025-12-05T10:38:57.283597852Z I1205 10:38:57.283586 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2025-12-05T10:38:57.283610782Z I1205 10:38:57.283602 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2025-12-05T10:38:57.283610782Z I1205 10:38:57.283604 1 base_controller.go:181] Shutting down NamespaceFinalizerController_openshift-apiserver ... 2025-12-05T10:38:57.283703295Z I1205 10:38:57.283678 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2025-12-05T10:38:57.283715825Z I1205 10:38:57.283702 1 base_controller.go:113] All RevisionController workers have been terminated 2025-12-05T10:38:57.283715825Z E1205 10:38:57.283701 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled" 2025-12-05T10:38:57.283727915Z I1205 10:38:57.283707 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionPrune controller ... 2025-12-05T10:38:57.283737636Z I1205 10:38:57.283729 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2025-12-05T10:38:57.283747676Z I1205 10:38:57.283734 1 base_controller.go:113] All openshift-apiserver-EncryptionPrune workers have been terminated 2025-12-05T10:38:57.283747676Z I1205 10:38:57.283740 1 base_controller.go:113] All ConfigObserver workers have been terminated 2025-12-05T10:38:57.283786787Z I1205 10:38:57.283761 1 base_controller.go:123] Shutting down worker of openshift-apiserver-EncryptionCondition controller ... 2025-12-05T10:38:57.283798737Z I1205 10:38:57.283784 1 base_controller.go:113] All openshift-apiserver-EncryptionCondition workers have been terminated 2025-12-05T10:38:57.283798737Z I1205 10:38:57.283787 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2025-12-05T10:38:57.283854389Z E1205 10:38:57.283822 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.authorization.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:38:57.284840445Z I1205 10:38:57.284816 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-apiserver controller ... 2025-12-05T10:38:57.284905676Z I1205 10:38:57.284875 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2025-12-05T10:38:57.284905676Z I1205 10:38:57.284901 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2025-12-05T10:38:57.284918007Z I1205 10:38:57.284879 1 base_controller.go:113] All NamespaceFinalizerController_openshift-apiserver workers have been terminated 2025-12-05T10:38:57.284977618Z E1205 10:38:57.284951 1 base_controller.go:279] "Unhandled Error" err="OpenShiftAPIServer-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OpenShiftAPIServer-Workload\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:38:57.285138602Z E1205 10:38:57.285089 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:38:57.286147309Z E1205 10:38:57.285523 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"v3.11.0/openshift-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-apiserver\": context canceled, \"v3.11.0/openshift-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"v3.11.0/openshift-apiserver/pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:38:57.286209421Z I1205 10:38:57.286021 1 base_controller.go:123] Shutting down worker of OpenShiftAPIServer-WorkloadWorkloadController controller ... 2025-12-05T10:38:57.286209421Z I1205 10:38:57.286137 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2025-12-05T10:38:57.286209421Z I1205 10:38:57.286186 1 base_controller.go:113] All OpenShiftAPIServer-WorkloadWorkloadController workers have been terminated 2025-12-05T10:38:57.286224191Z I1205 10:38:57.286204 1 base_controller.go:113] All auditPolicyController workers have been terminated 2025-12-05T10:38:57.287690659Z I1205 10:38:57.287634 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2025-12-05T10:38:57.287690659Z I1205 10:38:57.287664 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2025-12-05T10:39:02.280664820Z I1205 10:39:02.280526 1 observer_polling.go:162] Shutting down file observer 2025-12-05T10:39:31.287972653Z E1205 10:39:31.287860 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2025-12-05T10:39:31.288676252Z W1205 10:39:31.288591 1 leaderelection.go:84] leader election lost config/pod/openshift-apiserver-operator/openshift-apiserver-operator-7bf7f6b755-hdjv7.json0000640000000000000000000001443215114533341030264 0ustar0000000000000000{"metadata":{"name":"openshift-apiserver-operator-7bf7f6b755-hdjv7","generateName":"openshift-apiserver-operator-7bf7f6b755-","namespace":"openshift-apiserver-operator","uid":"6f76d12f-5406-47e2-8337-2f50e35376d6","resourceVersion":"8785","creationTimestamp":"2025-12-05T10:35:54Z","labels":{"app":"openshift-apiserver-operator","pod-template-hash":"7bf7f6b755"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.7/23\"],\"mac_address\":\"0a:58:0a:80:00:07\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.7/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.7\"\n ],\n \"mac\": \"0a:58:0a:80:00:07\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-apiserver-operator-7bf7f6b755","uid":"2fc70e6a-281a-4fb1-aee7-063a2b2c7841","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access-fzwfq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59","command":["cluster-openshift-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.29"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.29"},{"name":"KUBE_APISERVER_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-fzwfq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-apiserver-operator","serviceAccount":"openshift-apiserver-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c10"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.7","podIPs":[{"ip":"10.128.0.7"}],"startTime":"2025-12-05T10:37:08Z","containerStatuses":[{"name":"openshift-apiserver-operator","state":{"running":{"startedAt":"2025-12-05T10:40:27Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-05T10:37:36Z","finishedAt":"2025-12-05T10:39:31Z","containerID":"cri-o://cc8433167039cff15f2a8553e5790127434ae4c5286a5db0777d417011f80f8c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59","containerID":"cri-o://a9c7e64b14cb47a9ab52158339c38bf528cc5bfc614193152b3c1935a66a8941","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-fzwfq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-scheduler-operator-container_current.log0000640000000000000000000001021515114533341042644 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5f85974995-dwh5t2025-12-05T10:40:27.514477846Z I1205 10:40:27.512178 1 cmd.go:253] Using service-serving-cert provided certificates 2025-12-05T10:40:27.514477846Z I1205 10:40:27.512277 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-05T10:40:27.514477846Z I1205 10:40:27.513369 1 observer_polling.go:159] Starting file observer 2025-12-05T10:40:27.533217649Z I1205 10:40:27.533166 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202511181540.p2.g6182930.assembly.stream.el9-6182930-6182930dde5ec8dd22bd50481e8b369ce673484c 2025-12-05T10:40:28.812149990Z I1205 10:40:28.811516 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-05T10:40:28.812149990Z W1205 10:40:28.811562 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:40:28.812149990Z W1205 10:40:28.811573 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:40:28.812149990Z W1205 10:40:28.811584 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-05T10:40:28.812149990Z W1205 10:40:28.811591 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-05T10:40:28.812149990Z W1205 10:40:28.811598 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-05T10:40:28.812149990Z W1205 10:40:28.811604 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-05T10:40:28.816903112Z I1205 10:40:28.816858 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-05T10:40:28.817296303Z I1205 10:40:28.817267 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2025-12-05T10:40:28.824130948Z I1205 10:40:28.824073 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-05T10:40:28.824187519Z I1205 10:40:28.824158 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-05T10:40:28.824303803Z I1205 10:40:28.824249 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:40:28.824326344Z I1205 10:40:28.824303 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:40:28.824336804Z I1205 10:40:28.824328 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:40:28.824346844Z I1205 10:40:28.824339 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:40:28.824662242Z I1205 10:40:28.824632 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-05T10:40:28.824698743Z I1205 10:40:28.824688 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-05T10:40:28.824825896Z I1205 10:40:28.824803 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-05T10:40:28.924645826Z I1205 10:40:28.924577 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:40:28.924645826Z I1205 10:40:28.924625 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-05T10:40:28.924736578Z I1205 10:40:28.924717 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-scheduler-operator-container_previous.log0000640000000000000000000004256315114533341043051 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-5f85974995-dwh5t2025-12-05T10:38:23.725707658Z I1205 10:38:23.725632 1 request.go:700] Waited for 1.194825769s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/openshift-kube-scheduler-master-0 2025-12-05T10:38:24.425023749Z I1205 10:38:24.424974 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2025-12-05T10:38:28.382521843Z I1205 10:38:28.381175 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2025-12-05T10:38:28.482949773Z I1205 10:38:28.482899 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2025-12-05T10:38:30.783451362Z I1205 10:38:30.783370 1 installer_controller.go:550] "master-0" is in transition to 3, but has not made progress because installer is not finished, but in Running phase 2025-12-05T10:38:52.127451512Z I1205 10:38:52.127328 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="802e1a712af5853551a2e8f5e717429611eb65a79ddd727be8aecb7eae57a580") 2025-12-05T10:38:52.127451512Z W1205 10:38:52.127374 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.key was created 2025-12-05T10:38:52.127517033Z I1205 10:38:52.127477 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2025-12-05T10:38:52.127517033Z I1205 10:38:52.127510 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="39c6674d96ff7bd1926a405d813135ae9acc392b98a7183152ae88545a357c88") 2025-12-05T10:38:52.127556474Z I1205 10:38:52.127524 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2025-12-05T10:38:52.127556474Z I1205 10:38:52.127519 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2025-12-05T10:38:52.127566735Z I1205 10:38:52.127561 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2025-12-05T10:38:52.127610386Z I1205 10:38:52.127580 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2025-12-05T10:38:52.127610386Z E1205 10:38:52.127573 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-scheduler-operator/leases/openshift-cluster-kube-scheduler-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2025-12-05T10:38:52.127680649Z I1205 10:38:52.127630 1 base_controller.go:181] Shutting down PruneController ... 2025-12-05T10:38:52.127689189Z I1205 10:38:52.127682 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2025-12-05T10:38:52.127696889Z E1205 10:38:52.127660 1 leaderelection.go:436] error retrieving resource lock openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: client rate limiter Wait returned an error: context canceled 2025-12-05T10:38:52.127696889Z I1205 10:38:52.127689 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2025-12-05T10:38:52.127726200Z I1205 10:38:52.127700 1 leaderelection.go:297] failed to renew lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock: timed out waiting for the condition 2025-12-05T10:38:52.127726200Z I1205 10:38:52.127710 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2025-12-05T10:38:52.127734630Z I1205 10:38:52.127726 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2025-12-05T10:38:52.127743760Z I1205 10:38:52.127737 1 base_controller.go:113] All PruneController workers have been terminated 2025-12-05T10:38:52.127781341Z I1205 10:38:52.127761 1 controller_manager.go:54] PruneController controller terminated 2025-12-05T10:38:52.127824672Z I1205 10:38:52.127801 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:38:52.127859913Z I1205 10:38:52.127841 1 base_controller.go:181] Shutting down LoggingSyncer ... 2025-12-05T10:38:52.127867873Z I1205 10:38:52.127861 1 base_controller.go:181] Shutting down RevisionController ... 2025-12-05T10:38:52.127889104Z I1205 10:38:52.127875 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2025-12-05T10:38:52.127889104Z I1205 10:38:52.127882 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2025-12-05T10:38:52.127934905Z I1205 10:38:52.127916 1 controller_manager.go:54] LoggingSyncer controller terminated 2025-12-05T10:38:52.127934905Z I1205 10:38:52.127928 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2025-12-05T10:38:52.127943015Z I1205 10:38:52.127932 1 secure_serving.go:258] Stopped listening on [::]:8443 2025-12-05T10:38:52.127950495Z I1205 10:38:52.127941 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-971357936/tls.crt::/tmp/serving-cert-971357936/tls.key" 2025-12-05T10:38:52.127986136Z I1205 10:38:52.127964 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2025-12-05T10:38:52.127986136Z I1205 10:38:52.127978 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2025-12-05T10:38:52.127994667Z I1205 10:38:52.127978 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2025-12-05T10:38:52.127994667Z I1205 10:38:52.127991 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2025-12-05T10:38:52.128015717Z I1205 10:38:52.127964 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2025-12-05T10:38:52.128051138Z I1205 10:38:52.128031 1 base_controller.go:181] Shutting down Installer ... 2025-12-05T10:38:52.128051138Z I1205 10:38:52.128036 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2025-12-05T10:38:52.128051138Z I1205 10:38:52.128032 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2025-12-05T10:38:52.128061338Z I1205 10:38:52.128048 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:38:52.128061338Z I1205 10:38:52.128054 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2025-12-05T10:38:52.128069038Z I1205 10:38:52.128060 1 base_controller.go:181] Shutting down kube-scheduler ... 2025-12-05T10:38:52.128077849Z I1205 10:38:52.128068 1 builder.go:335] server exited 2025-12-05T10:38:52.128077849Z I1205 10:38:52.128073 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2025-12-05T10:38:52.128085789Z I1205 10:38:52.128075 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2025-12-05T10:38:52.128092959Z I1205 10:38:52.128087 1 base_controller.go:181] Shutting down GuardController ... 2025-12-05T10:38:52.128121990Z I1205 10:38:52.128098 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2025-12-05T10:38:52.128236463Z E1205 10:38:52.128161 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-InstallerState reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": context canceled" 2025-12-05T10:38:52.128236463Z I1205 10:38:52.128178 1 base_controller.go:113] All RevisionController workers have been terminated 2025-12-05T10:38:52.128236463Z I1205 10:38:52.128183 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2025-12-05T10:38:52.128236463Z I1205 10:38:52.128189 1 controller_manager.go:54] RevisionController controller terminated 2025-12-05T10:38:52.128236463Z I1205 10:38:52.128198 1 base_controller.go:181] Shutting down TargetConfigController ... 2025-12-05T10:38:52.128236463Z I1205 10:38:52.128202 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2025-12-05T10:38:52.128236463Z I1205 10:38:52.128219 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2025-12-05T10:38:52.128236463Z I1205 10:38:52.128231 1 base_controller.go:113] All GuardController workers have been terminated 2025-12-05T10:38:52.128266793Z I1205 10:38:52.128240 1 controller_manager.go:54] GuardController controller terminated 2025-12-05T10:38:52.128266793Z I1205 10:38:52.128258 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2025-12-05T10:38:52.128333285Z I1205 10:38:52.128305 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2025-12-05T10:38:52.128333285Z I1205 10:38:52.128327 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2025-12-05T10:38:52.128342875Z I1205 10:38:52.128334 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2025-12-05T10:38:52.128342875Z I1205 10:38:52.128340 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2025-12-05T10:38:52.128371786Z I1205 10:38:52.128349 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2025-12-05T10:38:52.128371786Z I1205 10:38:52.128363 1 base_controller.go:113] All kube-scheduler workers have been terminated 2025-12-05T10:38:52.128408847Z I1205 10:38:52.128391 1 base_controller.go:181] Shutting down ConfigObserver ... 2025-12-05T10:38:52.128442298Z I1205 10:38:52.128406 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2025-12-05T10:38:52.128442298Z I1205 10:38:52.128413 1 base_controller.go:113] All ConfigObserver workers have been terminated 2025-12-05T10:38:52.129382863Z W1205 10:38:52.129301 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2025-12-05T10:38:52.129382863Z E1205 10:38:52.129322 1 base_controller.go:279] "Unhandled Error" err="kube-scheduler-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:38:52.129382863Z W1205 10:38:52.129324 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2025-12-05T10:38:52.129382863Z W1205 10:38:52.129372 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2025-12-05T10:38:52.129658860Z E1205 10:38:52.129492 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-scheduler-Installer\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:38:52.129658860Z I1205 10:38:52.129509 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2025-12-05T10:38:52.129658860Z I1205 10:38:52.129531 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2025-12-05T10:38:52.129658860Z I1205 10:38:52.129539 1 controller_manager.go:54] MissingStaticPodController controller terminated 2025-12-05T10:38:52.129744282Z I1205 10:38:52.129657 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2025-12-05T10:38:52.129744282Z I1205 10:38:52.129670 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2025-12-05T10:38:52.129744282Z I1205 10:38:52.129675 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2025-12-05T10:38:52.129973958Z E1205 10:38:52.129895 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2025-12-05T10:38:52.130775189Z I1205 10:38:52.130688 1 base_controller.go:123] Shutting down worker of Installer controller ... 2025-12-05T10:38:52.130775189Z I1205 10:38:52.130711 1 base_controller.go:113] All Installer workers have been terminated 2025-12-05T10:38:52.130775189Z I1205 10:38:52.130693 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2025-12-05T10:38:52.130775189Z I1205 10:38:52.130728 1 controller_manager.go:54] Installer controller terminated 2025-12-05T10:38:52.130775189Z I1205 10:38:52.130737 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2025-12-05T10:38:52.130775189Z I1205 10:38:52.130745 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2025-12-05T10:38:52.130997685Z I1205 10:38:52.130958 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2025-12-05T10:38:52.130997685Z I1205 10:38:52.130975 1 base_controller.go:113] All TargetConfigController workers have been terminated 2025-12-05T10:38:52.130997685Z E1205 10:38:52.130971 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:38:52.131135119Z E1205 10:38:52.131086 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler\": context canceled, \"assets/kube-scheduler/leader-election-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/scheduler-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/policyconfigmap-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/policyconfigmap-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:38:52.131135119Z I1205 10:38:52.127646 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2025-12-05T10:38:52.131157959Z I1205 10:38:52.131137 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2025-12-05T10:38:52.131157959Z I1205 10:38:52.131145 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2025-12-05T10:38:52.132109244Z I1205 10:38:52.132057 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2025-12-05T10:38:52.132109244Z I1205 10:38:52.132083 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2025-12-05T10:38:52.132109244Z I1205 10:38:52.132090 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2025-12-05T10:38:52.132194506Z I1205 10:38:52.132158 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2025-12-05T10:38:52.132194506Z I1205 10:38:52.132177 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2025-12-05T10:38:57.128324591Z I1205 10:38:57.128166 1 observer_polling.go:162] Shutting down file observer 2025-12-05T10:39:26.130934748Z E1205 10:39:26.130805 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2025-12-05T10:39:26.130934748Z W1205 10:39:26.130898 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5f85974995-dwh5t.json0000640000000000000000000001365215114533341031702 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-5f85974995-dwh5t","generateName":"openshift-kube-scheduler-operator-5f85974995-","namespace":"openshift-kube-scheduler-operator","uid":"4825316a-ea9f-4d3d-838b-fa809a6e49c7","resourceVersion":"8791","creationTimestamp":"2025-12-05T10:35:55Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"5f85974995"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-5f85974995","uid":"3164f37b-8ec3-4bb2-973c-ebd1d55e99f4","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.29"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.13"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2025-12-05T10:37:08Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2025-12-05T10:40:27Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-05T10:37:36Z","finishedAt":"2025-12-05T10:39:26Z","containerID":"cri-o://f2785fc5d00b92168028cf4e3273a28c6085e8db64c579bdce5eca572512c7d9"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","containerID":"cri-o://66fcfd4e1afdbd3398cb750ace935d91ba542db71f3971aeea67f31628c3ef00","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-3-master-0/installer_current.log0000640000000000000000000001320115114533341027154 0ustar00000000000000002025-12-05T10:38:21.770582773Z I1205 10:38:21.770336 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc000333b80 cert-secrets:0xc0003337c0 configmaps:0xc000333360 namespace:0xc000333180 optional-configmaps:0xc0003334a0 optional-secrets:0xc000333400 pod:0xc000333220 pod-manifest-dir:0xc0003335e0 resource-dir:0xc000333540 revision:0xc0003330e0 secrets:0xc0003332c0 v:0xc000822640] [0xc000822640 0xc0003330e0 0xc000333180 0xc000333220 0xc000333540 0xc0003335e0 0xc000333360 0xc0003334a0 0xc000333400 0xc0003332c0 0xc000333b80 0xc0003337c0] [] map[cert-configmaps:0xc000333860 cert-dir:0xc000333b80 cert-secrets:0xc0003337c0 configmaps:0xc000333360 help:0xc000822a00 kubeconfig:0xc000333040 log-flush-frequency:0xc0008225a0 namespace:0xc000333180 optional-cert-configmaps:0xc000333a40 optional-cert-secrets:0xc000333900 optional-configmaps:0xc0003334a0 optional-secrets:0xc000333400 pod:0xc000333220 pod-manifest-dir:0xc0003335e0 pod-manifests-lock-file:0xc000333720 resource-dir:0xc000333540 revision:0xc0003330e0 secrets:0xc0003332c0 timeout-duration:0xc000333680 v:0xc000822640 vmodule:0xc0008226e0] [0xc000333040 0xc0003330e0 0xc000333180 0xc000333220 0xc0003332c0 0xc000333360 0xc000333400 0xc0003334a0 0xc000333540 0xc0003335e0 0xc000333680 0xc000333720 0xc0003337c0 0xc000333860 0xc000333900 0xc000333a40 0xc000333b80 0xc0008225a0 0xc000822640 0xc0008226e0 0xc000822a00] [0xc000333860 0xc000333b80 0xc0003337c0 0xc000333360 0xc000822a00 0xc000333040 0xc0008225a0 0xc000333180 0xc000333a40 0xc000333900 0xc0003334a0 0xc000333400 0xc000333220 0xc0003335e0 0xc000333720 0xc000333540 0xc0003330e0 0xc0003332c0 0xc000333680 0xc000822640 0xc0008226e0] map[104:0xc000822a00 118:0xc000822640] [] -1 0 0xc0005e0330 true 0x223c100 []} 2025-12-05T10:38:21.770582773Z I1205 10:38:21.770564 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000a97520)({ 2025-12-05T10:38:21.770582773Z KubeConfig: (string) "", 2025-12-05T10:38:21.770582773Z KubeClient: (kubernetes.Interface) , 2025-12-05T10:38:21.770582773Z Revision: (string) (len=1) "3", 2025-12-05T10:38:21.770582773Z NodeName: (string) "", 2025-12-05T10:38:21.770582773Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2025-12-05T10:38:21.770582773Z Clock: (clock.RealClock) { 2025-12-05T10:38:21.770582773Z }, 2025-12-05T10:38:21.770582773Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2025-12-05T10:38:21.770582773Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2025-12-05T10:38:21.770582773Z (string) (len=31) "localhost-recovery-client-token" 2025-12-05T10:38:21.770582773Z }, 2025-12-05T10:38:21.770582773Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2025-12-05T10:38:21.770582773Z (string) (len=12) "serving-cert" 2025-12-05T10:38:21.770582773Z }, 2025-12-05T10:38:21.770582773Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2025-12-05T10:38:21.770582773Z (string) (len=18) "kube-scheduler-pod", 2025-12-05T10:38:21.770582773Z (string) (len=6) "config", 2025-12-05T10:38:21.770582773Z (string) (len=17) "serviceaccount-ca", 2025-12-05T10:38:21.770582773Z (string) (len=20) "scheduler-kubeconfig", 2025-12-05T10:38:21.770582773Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2025-12-05T10:38:21.770582773Z }, 2025-12-05T10:38:21.770582773Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2025-12-05T10:38:21.770582773Z (string) (len=16) "policy-configmap" 2025-12-05T10:38:21.770582773Z }, 2025-12-05T10:38:21.770582773Z CertSecretNames: ([]string) (len=1 cap=1) { 2025-12-05T10:38:21.770582773Z (string) (len=30) "kube-scheduler-client-cert-key" 2025-12-05T10:38:21.770582773Z }, 2025-12-05T10:38:21.770582773Z OptionalCertSecretNamePrefixes: ([]string) , 2025-12-05T10:38:21.770582773Z CertConfigMapNamePrefixes: ([]string) , 2025-12-05T10:38:21.770582773Z OptionalCertConfigMapNamePrefixes: ([]string) , 2025-12-05T10:38:21.770582773Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2025-12-05T10:38:21.770582773Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2025-12-05T10:38:21.770582773Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2025-12-05T10:38:21.770582773Z Timeout: (time.Duration) 2m0s, 2025-12-05T10:38:21.770582773Z StaticPodManifestsLockFile: (string) "", 2025-12-05T10:38:21.770582773Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2025-12-05T10:38:21.770582773Z KubeletVersion: (string) "" 2025-12-05T10:38:21.770582773Z }) 2025-12-05T10:38:21.771967812Z I1205 10:38:21.771920 1 cmd.go:413] Getting controller reference for node master-0 2025-12-05T10:38:21.784228209Z I1205 10:38:21.784156 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2025-12-05T10:38:21.784228209Z I1205 10:38:21.784215 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-05T10:38:21.784326022Z I1205 10:38:21.784227 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-05T10:38:21.787573473Z I1205 10:38:21.787512 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2025-12-05T10:38:31.792619603Z I1205 10:38:31.792511 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2025-12-05T10:39:01.793344695Z I1205 10:39:01.793237 1 cmd.go:524] Getting installer pods for node master-0 2025-12-05T10:39:15.796734243Z F1205 10:39:15.796608 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-scheduler/installer-3-master-0.json0000640000000000000000000001642415114533341022653 0ustar0000000000000000{"metadata":{"name":"installer-3-master-0","namespace":"openshift-kube-scheduler","uid":"6325f9a2-86d5-4fac-9e71-331b2628f965","resourceVersion":"8771","creationTimestamp":"2025-12-05T10:38:18Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.43/23\"],\"mac_address\":\"0a:58:0a:80:00:2b\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.43/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.43\"\n ],\n \"mac\": \"0a:58:0a:80:00:2b\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-3","uid":"7d81484c-65b2-48a9-b70d-47bdf289a974"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=3","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:27Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:18Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:26Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:26Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:18Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.43","podIPs":[{"ip":"10.128.0.43"}],"startTime":"2025-12-05T10:38:18Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"[]string) (len=1 cap=1) {\n (string) (len=12) \"serving-cert\"\n },\n ConfigMapNamePrefixes: ([]string) (len=5 cap=8) {\n (string) (len=18) \"kube-scheduler-pod\",\n (string) (len=6) \"config\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=20) \"scheduler-kubeconfig\",\n (string) (len=37) \"kube-scheduler-cert-syncer-kubeconfig\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=16) \"policy-configmap\"\n },\n CertSecretNames: ([]string) (len=1 cap=1) {\n (string) (len=30) \"kube-scheduler-client-cert-key\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI1205 10:38:21.771920 1 cmd.go:413] Getting controller reference for node master-0\nI1205 10:38:21.784156 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI1205 10:38:21.784215 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI1205 10:38:21.784227 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI1205 10:38:21.787512 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nI1205 10:38:31.792511 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI1205 10:39:01.793237 1 cmd.go:524] Getting installer pods for node master-0\nF1205 10:39:15.796608 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2025-12-05T10:38:21Z","finishedAt":"2025-12-05T10:39:15Z","containerID":"cri-o://df5bdcc899d9a7c7268a300825923259315bb7a02282ed76b8b7644641b06995"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","containerID":"cri-o://df5bdcc899d9a7c7268a300825923259315bb7a02282ed76b8b7644641b06995","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000004335715114533341030231 0ustar00000000000000002025-12-05T10:39:49.904641962Z - name: VolumeRestrictions 2025-12-05T10:39:49.904641962Z weight: 0 2025-12-05T10:39:49.904641962Z - name: NodeVolumeLimits 2025-12-05T10:39:49.904641962Z weight: 0 2025-12-05T10:39:49.904641962Z - name: VolumeBinding 2025-12-05T10:39:49.904641962Z weight: 0 2025-12-05T10:39:49.904641962Z - name: VolumeZone 2025-12-05T10:39:49.904641962Z weight: 0 2025-12-05T10:39:49.904641962Z - name: PodTopologySpread 2025-12-05T10:39:49.904641962Z weight: 2 2025-12-05T10:39:49.904641962Z - name: InterPodAffinity 2025-12-05T10:39:49.904641962Z weight: 2 2025-12-05T10:39:49.904641962Z - name: DefaultPreemption 2025-12-05T10:39:49.904641962Z weight: 0 2025-12-05T10:39:49.904641962Z - name: NodeResourcesBalancedAllocation 2025-12-05T10:39:49.904641962Z weight: 1 2025-12-05T10:39:49.904641962Z - name: ImageLocality 2025-12-05T10:39:49.904641962Z weight: 1 2025-12-05T10:39:49.904641962Z - name: DefaultBinder 2025-12-05T10:39:49.904641962Z weight: 0 2025-12-05T10:39:49.904641962Z permit: {} 2025-12-05T10:39:49.904641962Z postBind: {} 2025-12-05T10:39:49.904641962Z postFilter: {} 2025-12-05T10:39:49.904641962Z preBind: {} 2025-12-05T10:39:49.904641962Z preEnqueue: {} 2025-12-05T10:39:49.904641962Z preFilter: {} 2025-12-05T10:39:49.904641962Z preScore: {} 2025-12-05T10:39:49.904641962Z queueSort: {} 2025-12-05T10:39:49.904641962Z reserve: {} 2025-12-05T10:39:49.904641962Z score: {} 2025-12-05T10:39:49.904641962Z schedulerName: default-scheduler 2025-12-05T10:39:49.904641962Z > 2025-12-05T10:39:49.906606792Z I1205 10:39:49.906519 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.13" 2025-12-05T10:39:49.906606792Z I1205 10:39:49.906568 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2025-12-05T10:39:49.909854955Z I1205 10:39:49.909789 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:39:49.909887476Z I1205 10:39:49.909853 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:39:49.910161134Z I1205 10:39:49.910099 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1764931129\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1764931129\" (2025-12-05 09:38:49 +0000 UTC to 2026-12-05 09:38:49 +0000 UTC (now=2025-12-05 10:39:49.910078981 +0000 UTC))" 2025-12-05T10:39:49.910286627Z I1205 10:39:49.910079 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2025-12-05T10:39:49.911621201Z I1205 10:39:49.911519 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764931129\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764931129\" (2025-12-05 09:38:49 +0000 UTC to 2028-12-05 09:38:49 +0000 UTC (now=2025-12-05 10:39:49.911482827 +0000 UTC))" 2025-12-05T10:39:49.911621201Z I1205 10:39:49.911596 1 secure_serving.go:213] Serving securely on [::]:10259 2025-12-05T10:39:49.911759865Z I1205 10:39:49.911668 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-05T10:39:49.915540662Z I1205 10:39:49.915461 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.915855260Z I1205 10:39:49.915812 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2025-12-05T10:39:49.916128097Z I1205 10:39:49.916077 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.918115038Z I1205 10:39:49.918031 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.918281462Z I1205 10:39:49.918206 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.918640672Z I1205 10:39:49.918554 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.918640672Z I1205 10:39:49.918567 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.918752605Z I1205 10:39:49.918688 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.918809906Z I1205 10:39:49.918768 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.918901869Z I1205 10:39:49.918850 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.919002601Z I1205 10:39:49.918598 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2025-12-05T10:39:49.919136005Z I1205 10:39:49.919097 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.923725832Z I1205 10:39:49.923638 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.923826405Z I1205 10:39:49.923766 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.928158716Z I1205 10:39:49.928075 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.932199901Z I1205 10:39:49.932124 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:49.938661377Z I1205 10:39:49.938558 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:39:50.011170375Z I1205 10:39:50.011079 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:39:50.011708998Z I1205 10:39:50.011590 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-05 10:20:50 +0000 UTC to 2035-12-03 10:20:50 +0000 UTC (now=2025-12-05 10:39:50.011561494 +0000 UTC))" 2025-12-05T10:39:50.011708998Z I1205 10:39:50.011641 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2025-12-06 10:27:25 +0000 UTC (now=2025-12-05 10:39:50.011631216 +0000 UTC))" 2025-12-05T10:39:50.011708998Z I1205 10:39:50.011667 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2026-12-05 10:27:25 +0000 UTC (now=2025-12-05 10:39:50.011658227 +0000 UTC))" 2025-12-05T10:39:50.011708998Z I1205 10:39:50.011690 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2026-12-05 10:27:25 +0000 UTC (now=2025-12-05 10:39:50.011681087 +0000 UTC))" 2025-12-05T10:39:50.011728519Z I1205 10:39:50.011713 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-05 10:27:22 +0000 UTC to 2035-12-03 10:27:22 +0000 UTC (now=2025-12-05 10:39:50.011704348 +0000 UTC))" 2025-12-05T10:39:50.012016906Z I1205 10:39:50.011965 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1764931129\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1764931129\" (2025-12-05 09:38:49 +0000 UTC to 2026-12-05 09:38:49 +0000 UTC (now=2025-12-05 10:39:50.011950224 +0000 UTC))" 2025-12-05T10:39:50.012289793Z I1205 10:39:50.012182 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764931129\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764931129\" (2025-12-05 09:38:49 +0000 UTC to 2028-12-05 09:38:49 +0000 UTC (now=2025-12-05 10:39:50.01216831 +0000 UTC))" 2025-12-05T10:39:50.012401946Z I1205 10:39:50.012348 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2025-12-05T10:39:55.013454866Z E1205 10:39:55.013301 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2025-12-05T10:40:03.825884515Z E1205 10:40:03.825753 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2025-12-05T10:40:12.953888140Z E1205 10:40:12.953725 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2025-12-05T10:40:20.546543391Z E1205 10:40:20.546383 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2025-12-05T10:40:28.332830477Z E1205 10:40:28.332748 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io kube-scheduler) 2025-12-05T10:40:48.415618244Z I1205 10:40:48.415560 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2025-12-05T10:40:48.417599755Z I1205 10:40:48.417293 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-5465c8b4db-s4c2f" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:40:48.420030058Z I1205 10:40:48.417720 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-7c85c4dffd-vjvbz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:40:48.420030058Z I1205 10:40:48.419231 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-85d8db45d4-c2mhw" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:40:48.423142177Z I1205 10:40:48.423073 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-5f49d774cd-cfg5f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:48.423180118Z I1205 10:40:48.423138 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-74f484689c-wn8cz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:48.429682606Z I1205 10:40:48.428744 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-797cfd8b47-glpx7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:48.433476454Z I1205 10:40:48.430743 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-78f758c7b9-6t2gm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:48.433476454Z I1205 10:40:48.431085 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-88d48b57d-x7jfs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:48.433476454Z I1205 10:40:48.431271 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-fbc6455c4-mbm77" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:48.433476454Z I1205 10:40:48.431509 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-dcf7fc84b-9rzps" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:48.433476454Z I1205 10:40:48.431880 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-55965856b6-2sxv7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:48.433476454Z I1205 10:40:48.432060 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-698c598cfc-rgc4p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:48.433476454Z I1205 10:40:48.432653 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-dc5d7666f-2cf9h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:48.433476454Z I1205 10:40:48.433049 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-d7b67d8cf-krp6c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:49.911946543Z I1205 10:40:49.911358 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-74d9cbffbc-9jbnk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:50.753033489Z I1205 10:40:50.751894 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-djhk8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:50.942526529Z I1205 10:40:50.942451 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-6p8cq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:52.342008033Z I1205 10:40:52.341931 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-wk29h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:53.150291525Z I1205 10:40:53.149786 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-5n6nw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:40:53.547732339Z I1205 10:40:53.547658 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-pqhfn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:41:06.833740426Z I1205 10:41:06.833649 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-758cf9d97b-74dgz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:41:07.785984685Z I1205 10:41:07.785923 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-7c6d64c4cd-blwfs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:41:08.877105011Z I1205 10:41:08.873720 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-85d8db45d4-c2mhw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:41:08.877139642Z I1205 10:41:08.877100 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-7c85c4dffd-vjvbz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:41:08.878734373Z I1205 10:41:08.877539 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-5465c8b4db-s4c2f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:41:13.232572178Z I1205 10:41:13.232279 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-5t4nn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:41:26.409167238Z E1205 10:41:26.409031 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006571615114533341030426 0ustar00000000000000002025-12-05T10:35:32.247142299Z I1205 10:35:32.247122 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2025-12-05T10:35:32.268039762Z I1205 10:35:32.267977 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2025-12-05T10:35:32.268643378Z I1205 10:35:32.268595 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-pd4q6" 2025-12-05T10:35:33.270094225Z I1205 10:35:33.270009 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-pd4q6" 2025-12-05T10:35:35.271345427Z I1205 10:35:35.271186 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-pd4q6" 2025-12-05T10:35:39.273170573Z I1205 10:35:39.273056 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-pd4q6" 2025-12-05T10:35:47.279803233Z I1205 10:35:47.279017 1 schedule_one.go:1051] "Unable to schedule pod; no nodes are registered to the cluster; waiting" pod="assisted-installer/assisted-installer-controller-pd4q6" 2025-12-05T10:35:53.255351128Z I1205 10:35:53.255232 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2025-12-05T10:35:53.364343312Z I1205 10:35:53.364242 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-b9c5dfc78-4gqxr" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:53.460980560Z I1205 10:35:53.460862 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/cluster-monitoring-operator-7ff994598c-kq8qr" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:53.560471551Z I1205 10:35:53.560387 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/olm-operator-7cd7dbb44c-d25sk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:53.662648791Z I1205 10:35:53.662555 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-marketplace/marketplace-operator-f797b99b6-z9qcl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:53.761760222Z I1205 10:35:53.761684 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-operator-lifecycle-manager/package-server-manager-67477646d4-nm8cn" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:53.863487030Z I1205 10:35:53.863364 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-service-ca-operator/service-ca-operator-77758bc754-9lzv4" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:53.973791858Z I1205 10:35:53.973716 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/network-operator-79767b7ff9-t8j2j" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:35:54.068123406Z I1205 10:35:54.068038 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-85cff47f46-qwx2p" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:54.163945214Z I1205 10:35:54.162647 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:54.262551832Z I1205 10:35:54.262469 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:54.364625959Z I1205 10:35:54.364546 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-56fcb6cc5f-m6p27" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:54.462923810Z I1205 10:35:54.462840 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-6bc8656fdc-vd94f" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:54.562188825Z I1205 10:35:54.562067 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-7bf7f6b755-hdjv7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:54.660754712Z I1205 10:35:54.660683 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-7c56cf9b74-x6t9h" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:54.761233709Z I1205 10:35:54.761128 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-6c8676f99d-cwvk5" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:54.862152276Z I1205 10:35:54.862056 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-68758cbcdb-dnpcv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:54.966390669Z I1205 10:35:54.966328 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-77dfcc565f-bv84m" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:35:55.324285820Z I1205 10:35:55.324194 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-8649c48786-cgt5x" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:55.337643251Z I1205 10:35:55.337531 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-848f645654-rmdb8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:55.346318393Z I1205 10:35:55.346202 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-765d9ff747-p57fl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:55.364857736Z I1205 10:35:55.364056 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-image-registry/cluster-image-registry-operator-6fb9f88b7-f29mb" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:55.461388461Z I1205 10:35:55.461313 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5f85974995-dwh5t" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:35:57.297700752Z I1205 10:35:57.297645 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-pd4q6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:36:09.332270275Z I1205 10:36:09.332191 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-4w5fd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:36:19.184554416Z I1205 10:36:19.184484 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-lxmgz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:36:19.388679828Z I1205 10:36:19.388597 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-dms5d" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:36:20.181541428Z I1205 10:36:20.181027 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-8gjgm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:36:22.251235918Z I1205 10:36:22.250683 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-7dfc5b745f-67rx7" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:36:31.617514492Z I1205 10:36:31.617454 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-5df5548d54-gr5gp" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:36:31.786161969Z I1205 10:36:31.785839 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-d89ht" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:36:33.770698614Z I1205 10:36:33.770638 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-85d8db45d4-c2mhw" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:36:34.771613618Z I1205 10:36:34.770984 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-d6fzk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:36:37.381279121Z I1205 10:36:37.381214 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-ql7j7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:06.960041844Z I1205 10:37:06.959969 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-rsfjs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.454536943Z I1205 10:37:08.453743 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-b9c5dfc78-4gqxr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.458942405Z I1205 10:37:08.458666 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-85cff47f46-qwx2p" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.458942405Z I1205 10:37:08.458741 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-56fcb6cc5f-m6p27" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.459030577Z I1205 10:37:08.459005 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-7bf7f6b755-hdjv7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.459070138Z I1205 10:37:08.459051 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5f85974995-dwh5t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.459143480Z I1205 10:37:08.459123 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-6bc8656fdc-vd94f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.459181 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-765d9ff747-p57fl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.459174 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-6fb9f88b7-f29mb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.459278 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-68758cbcdb-dnpcv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.459591 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-7cd7dbb44c-d25sk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.459641 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-77758bc754-9lzv4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.459862 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-f797b99b6-z9qcl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.459892 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.459929 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-67477646d4-nm8cn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.460146 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.460255 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-6c8676f99d-cwvk5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.460610 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-7ff994598c-kq8qr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460732121Z I1205 10:37:08.460684 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-7dfc5b745f-67rx7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.460972748Z I1205 10:37:08.460919 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-7c56cf9b74-x6t9h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.464531728Z I1205 10:37:08.462387 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-848f645654-rmdb8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.464837966Z I1205 10:37:08.464736 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-8649c48786-cgt5x" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:08.476281698Z I1205 10:37:08.476228 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-d6wjk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:37.754859585Z I1205 10:37:37.754239 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-6b958b6f94-lgn6v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:38.262111046Z I1205 10:37:38.262001 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-74b7b57c65-sfvzd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:39.320677173Z I1205 10:37:39.320603 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-77f4fc6d5d-zdn92" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:39.782747276Z I1205 10:37:39.782675 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-77c99c46b8-m7zqs" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:40.193771817Z I1205 10:37:40.193329 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-76d4564964-xm2tr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:40.200005103Z I1205 10:37:40.199860 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5d66677cf8-q9htp" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2025-12-05T10:37:41.796740165Z I1205 10:37:41.796683 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6d9cb7b7fc-f9nz6" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2025-12-05T10:37:43.359600660Z I1205 10:37:43.359532 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6d9cb7b7fc-f9nz6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:49.804819527Z I1205 10:37:49.801331 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-7c8487d4d9-hsrsh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:51.098053948Z I1205 10:37:51.097000 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-hvh88" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:53.739244440Z I1205 10:37:53.738269 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-5b9fd577f8-6sxcx" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2025-12-05T10:37:54.893682158Z I1205 10:37:54.893558 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-5b9fd577f8-6sxcx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:57.659038079Z I1205 10:37:57.658484 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-4vxng" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:58.131077976Z I1205 10:37:58.126060 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-qkccw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:37:58.351465526Z I1205 10:37:58.350660 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-5465c8b4db-s4c2f" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:37:59.169492863Z I1205 10:37:59.169375 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-6458c74b4c-4gvlc" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2025-12-05T10:37:59.225618859Z I1205 10:37:59.225441 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-7f6f96665d-4nkln" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2025-12-05T10:38:01.073715588Z I1205 10:38:01.073412 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-7f6f96665d-4nkln" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2025-12-05T10:38:01.081833708Z I1205 10:38:01.081748 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-6458c74b4c-4gvlc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:38:01.918120701Z I1205 10:38:01.918025 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-7c85c4dffd-vjvbz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2025-12-05T10:38:02.369340328Z I1205 10:38:02.368854 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-85b8f855df-8g52w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:38:05.897365871Z I1205 10:38:05.897298 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-7f6f96665d-4nkln" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:38:08.572922054Z I1205 10:38:08.570307 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-7cc89f4c4c-lth87" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:38:08.639932418Z I1205 10:38:08.639829 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-7cbd59c7f8-dh5tt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:38:14.314289362Z I1205 10:38:14.313850 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-6d5d5dcc89-27xm6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:38:20.365847819Z I1205 10:38:20.364520 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-86f4478dbf-jqlt9" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2025-12-05T10:38:20.444880703Z I1205 10:38:20.444802 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-c7946c9c4-hq97s" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2025-12-05T10:38:21.396071166Z I1205 10:38:21.395961 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-86f4478dbf-jqlt9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:38:22.398528027Z I1205 10:38:22.398383 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-c7946c9c4-hq97s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:38:28.456175176Z I1205 10:38:28.455638 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-7df95c79b5-qnq6t" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:38:30.691034619Z I1205 10:38:30.690841 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-f797d8546-65t96" node="master-0" evaluatedNodes=1 feasibleNodes=1 2025-12-05T10:38:37.495999899Z E1205 10:38:37.495855 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded, falling back to slow path 2025-12-05T10:38:42.495867796Z E1205 10:38:42.495767 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2025-12-05T10:38:42.495867796Z I1205 10:38:42.495814 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2025-12-05T10:38:47.496781436Z E1205 10:38:47.496647 1 leaderelection.go:322] Failed to release lock: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2025-12-05T10:38:47.496781436Z E1205 10:38:47.496765 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515114533341023004 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"ea149711-9799-4257-ba5c-349198b203f3","resourceVersion":"8707","creationTimestamp":"2025-12-05T10:36:56Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"5e09e2af7200e6f9be469dbfd9bb1127","kubernetes.io/config.mirror":"5e09e2af7200e6f9be469dbfd9bb1127","kubernetes.io/config.seen":"2025-12-05T10:35:18.636664765Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"ea73023b-75de-4456-80a9-4718aa8e39ac","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:49Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:49Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-05T10:37:39Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2025-12-05T10:38:49Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2025-12-05T10:35:29Z","finishedAt":"2025-12-05T10:38:47Z","containerID":"cri-o://f776aeb301b1d6208bd3c17cd609758f324f2d8cdb991d8f696e67b96ec0b782"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","containerID":"cri-o://2802349f3c37913962bf76abd70cc068ced790cc5227082ed50e6322ea462000","started":true}],"qosClass":"Burstable"}}config/pod/kube-system/bootstrap-kube-controller-manager-master-0.json0000640000000000000000000002735115114533341024622 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-controller-manager-master-0","namespace":"kube-system","uid":"bb8fe36f-b78d-43e4-b028-ebd3753d3afe","resourceVersion":"9061","creationTimestamp":"2025-12-05T10:36:52Z","labels":{"openshift.io/component":"controller-manager","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"8b47694fcc32464ab24d09c23d6efb57","kubernetes.io/config.mirror":"8b47694fcc32464ab24d09c23d6efb57","kubernetes.io/config.seen":"2025-12-05T10:35:18.636663785Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"ea73023b-75de-4456-80a9-4718aa8e39ac","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"etc-kubernetes-cloud","hostPath":{"path":"/etc/kubernetes/cloud","type":""}},{"name":"config","hostPath":{"path":"/etc/kubernetes/bootstrap-configs","type":""}},{"name":"ssl-certs-host","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","command":["hyperkube","kube-controller-manager"],"args":["--openshift-config=/etc/kubernetes/config/kube-controller-manager-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2","--allocate-node-cidrs=false","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--cert-dir=/var/run/kubernetes","--cloud-provider=external","--cluster-cidr=10.128.0.0/16","--cluster-signing-cert-file=/etc/kubernetes/secrets/kubelet-signer.crt","--cluster-signing-duration=720h","--cluster-signing-key-file=/etc/kubernetes/secrets/kubelet-signer.key","--controllers=*","--controllers=-bootstrapsigner","--controllers=-tokencleaner","--controllers=-ttl","--enable-dynamic-provisioning=true","--feature-gates=AWSClusterHostedDNS=false","--feature-gates=AWSEFSDriverVolumeMetrics=true","--feature-gates=AdditionalRoutingCapabilities=false","--feature-gates=AdminNetworkPolicy=true","--feature-gates=AlibabaPlatform=true","--feature-gates=AutomatedEtcdBackup=false","--feature-gates=AzureWorkloadIdentity=true","--feature-gates=BareMetalLoadBalancer=true","--feature-gates=BootcNodeManagement=false","--feature-gates=BuildCSIVolumes=true","--feature-gates=CSIDriverSharedResource=false","--feature-gates=ChunkSizeMiB=true","--feature-gates=CloudDualStackNodeIPs=true","--feature-gates=ClusterAPIInstall=false","--feature-gates=ClusterAPIInstallIBMCloud=false","--feature-gates=ClusterMonitoringConfig=false","--feature-gates=ConsolePluginContentSecurityPolicy=false","--feature-gates=DNSNameResolver=false","--feature-gates=DisableKubeletCloudCredentialProviders=true","--feature-gates=DynamicResourceAllocation=false","--feature-gates=EtcdBackendQuota=false","--feature-gates=EventedPLEG=false","--feature-gates=Example=false","--feature-gates=ExternalOIDC=false","--feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false","--feature-gates=GCPClusterHostedDNS=false","--feature-gates=GCPLabelsTags=true","--feature-gates=GatewayAPI=false","--feature-gates=HardwareSpeed=true","--feature-gates=ImageStreamImportMode=false","--feature-gates=IngressControllerDynamicConfigurationManager=false","--feature-gates=IngressControllerLBSubnetsAWS=true","--feature-gates=InsightsConfig=false","--feature-gates=InsightsConfigAPI=false","--feature-gates=InsightsOnDemandDataGather=false","--feature-gates=InsightsRuntimeExtractor=false","--feature-gates=KMSv1=true","--feature-gates=MachineAPIMigration=false","--feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false","--feature-gates=MachineAPIProviderOpenStack=false","--feature-gates=MachineConfigNodes=false","--feature-gates=ManagedBootImages=true","--feature-gates=ManagedBootImagesAWS=true","--feature-gates=MaxUnavailableStatefulSet=false","--feature-gates=MetricsCollectionProfiles=false","--feature-gates=MinimumKubeletVersion=false","--feature-gates=MixedCPUsAllocation=false","--feature-gates=MultiArchInstallAWS=true","--feature-gates=MultiArchInstallAzure=false","--feature-gates=MultiArchInstallGCP=true","--feature-gates=NetworkDiagnosticsConfig=true","--feature-gates=NetworkLiveMigration=true","--feature-gates=NetworkSegmentation=true","--feature-gates=NewOLM=true","--feature-gates=NodeDisruptionPolicy=true","--feature-gates=NodeSwap=false","--feature-gates=NutanixMultiSubnets=false","--feature-gates=OVNObservability=false","--feature-gates=OnClusterBuild=true","--feature-gates=OpenShiftPodSecurityAdmission=false","--feature-gates=PersistentIPsForVirtualization=true","--feature-gates=PinnedImages=false","--feature-gates=PlatformOperators=false","--feature-gates=PrivateHostedZoneAWS=true","--feature-gates=ProcMountType=false","--feature-gates=RouteAdvertisements=false","--feature-gates=RouteExternalCertificate=false","--feature-gates=ServiceAccountTokenNodeBinding=false","--feature-gates=SetEIPForNLBIngressController=true","--feature-gates=SignatureStores=false","--feature-gates=SigstoreImageVerification=false","--feature-gates=StreamingCollectionEncodingToJSON=false","--feature-gates=StreamingCollectionEncodingToProtobuf=false","--feature-gates=TranslateStreamCloseWebsocketRequests=false","--feature-gates=UpgradeStatus=false","--feature-gates=UserNamespacesPodSecurityStandards=false","--feature-gates=UserNamespacesSupport=false","--feature-gates=VSphereControlPlaneMachineSet=true","--feature-gates=VSphereDriverConfiguration=true","--feature-gates=VSphereMultiNetworks=false","--feature-gates=VSphereMultiVCenters=true","--feature-gates=VSphereStaticIPs=true","--feature-gates=ValidatingAdmissionPolicy=true","--feature-gates=VolumeAttributesClass=false","--feature-gates=VolumeGroupSnapshot=false","--flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec","--kube-api-burst=300","--kube-api-qps=150","--leader-elect-renew-deadline=12s","--leader-elect-resource-lock=leases","--leader-elect-retry-period=3s","--leader-elect=true","--pv-recycler-pod-template-filepath-hostpath=","--pv-recycler-pod-template-filepath-nfs=","--root-ca-file=/etc/kubernetes/secrets/kube-apiserver-complete-server-ca-bundle.crt","--secure-port=10257","--service-account-private-key-file=/etc/kubernetes/secrets/service-account.key","--service-cluster-ip-range=172.30.0.0/16","--use-service-account-credentials=true"],"ports":[{"hostPort":10257,"containerPort":10257,"protocol":"TCP"}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","command":["cluster-policy-controller","start"],"args":["--config=/etc/kubernetes/config/cluster-policy-controller-config.yaml","--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--namespace=$(POD_NAMESPACE)","--v=2"],"ports":[{"hostPort":10357,"containerPort":10357,"protocol":"TCP"}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"ssl-certs-host","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"etc-kubernetes-cloud","readOnly":true,"mountPath":"/etc/kubernetes/cloud"},{"name":"config","readOnly":true,"mountPath":"/etc/kubernetes/config"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-05T10:37:39Z","containerStatuses":[{"name":"cluster-policy-controller","state":{"running":{"startedAt":"2025-12-05T10:35:32Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","containerID":"cri-o://80aee350277cce308d84133aa5eefc6be3ed0712557f82d0d22b78dac448f0af","started":true},{"name":"kube-controller-manager","state":{"running":{"startedAt":"2025-12-05T10:40:27Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2025-12-05T10:38:47Z","finishedAt":"2025-12-05T10:39:47Z","containerID":"cri-o://e7ce8dc7bd304b25a361ecabc9d8faa1f0ae1eca9ef1f9dc24bcebc4d09b4a20"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","containerID":"cri-o://efee17240223c7e06e121d89cbef5a60b4ccceeebdd17b05f12e6a98b82892f6","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000013765615114533341044127 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-848f645654-rmdb82025-12-05T10:40:33.892875512Z Timeout: (time.Duration) 2m0s, 2025-12-05T10:40:33.892875512Z StaticPodManifestsLockFile: (string) "", 2025-12-05T10:40:33.892875512Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2025-12-05T10:40:33.892875512Z KubeletVersion: (string) "" 2025-12-05T10:40:33.892875512Z }) 2025-12-05T10:40:33.892875512Z I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0 2025-12-05T10:40:33.892875512Z I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2025-12-05T10:40:33.892875512Z I1205 10:38:24.423067 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-05T10:40:33.892875512Z I1205 10:38:24.423082 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-05T10:40:33.892875512Z I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2025-12-05T10:40:33.892875512Z I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0 2025-12-05T10:40:33.892875512Z F1205 10:39:08.456301 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2025-12-05T10:40:33.893942249Z W1205 10:40:33.893893 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2025-12-05T10:40:33.893942249Z W1205 10:40:33.893916 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2025-12-05T10:40:33.893942249Z W1205 10:40:33.893922 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2025-12-05T10:40:33.927886774Z I1205 10:40:33.927730 1 prune_controller.go:277] Nothing to prune 2025-12-05T10:40:33.928117150Z I1205 10:40:33.928032 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-05T10:37:38Z","message":"NodeControllerDegraded: All master nodes are ready\nRevisionControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I1205 10:38:24.423067 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.423082 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F1205 10:39:08.456301 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-05T10:38:20Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-05T10:37:40Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-05T10:37:38Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-05T10:37:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-05T10:40:33.952522298Z I1205 10:40:33.952242 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nRevisionControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded" to "NodeControllerDegraded: All master nodes are ready\nRevisionControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I1205 10:38:24.423067 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.423082 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F1205 10:39:08.456301 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: " 2025-12-05T10:40:34.488476308Z I1205 10:40:34.488321 1 request.go:700] Waited for 1.176307308s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-infra 2025-12-05T10:40:38.005159649Z I1205 10:40:38.005004 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing 2025-12-05T10:40:38.025592454Z E1205 10:40:38.025526 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:38.025592454Z I1205 10:40:38.025571 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:38.029118176Z I1205 10:40:38.028625 1 prune_controller.go:277] Nothing to prune 2025-12-05T10:40:38.034081703Z I1205 10:40:38.032515 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RevisionTriggered' new revision 2 triggered by "required configmap/config has changed,required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed" 2025-12-05T10:40:38.054777666Z E1205 10:40:38.054275 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:38.054777666Z I1205 10:40:38.054498 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:38.063050499Z W1205 10:40:38.062992 1 dynamic_operator_client.go:355] .status.conditions["RevisionControllerDegraded"].message is missing; this will eventually be fatal 2025-12-05T10:40:38.064508226Z I1205 10:40:38.064472 1 prune_controller.go:277] Nothing to prune 2025-12-05T10:40:38.138246926Z I1205 10:40:38.138174 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-05T10:37:38Z","message":"NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I1205 10:38:24.423067 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.423082 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F1205 10:39:08.456301 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-05T10:38:20Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-05T10:37:40Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-05T10:37:38Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-05T10:37:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-05T10:40:38.138627425Z I1205 10:40:38.138600 1 prune_controller.go:277] Nothing to prune 2025-12-05T10:40:38.160819137Z I1205 10:40:38.155740 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nRevisionControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I1205 10:38:24.423067 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.423082 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F1205 10:39:08.456301 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: " to "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I1205 10:38:24.423067 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.423082 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F1205 10:39:08.456301 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: " 2025-12-05T10:40:39.206192083Z I1205 10:40:39.205412 1 request.go:700] Waited for 1.052246364s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/default/endpoints/kubernetes 2025-12-05T10:40:39.208836051Z I1205 10:40:39.208634 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:39.208867352Z E1205 10:40:39.208720 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:39.809874568Z I1205 10:40:39.809782 1 installer_controller.go:540] "master-0" moving to (v1.NodeStatus) { 2025-12-05T10:40:39.809874568Z NodeName: (string) (len=8) "master-0", 2025-12-05T10:40:39.809874568Z CurrentRevision: (int32) 0, 2025-12-05T10:40:39.809874568Z TargetRevision: (int32) 2, 2025-12-05T10:40:39.809874568Z LastFailedRevision: (int32) 1, 2025-12-05T10:40:39.809874568Z LastFailedTime: (*v1.Time)(0xc001eaaa80)(2025-12-05 10:40:33 +0000 UTC), 2025-12-05T10:40:39.809874568Z LastFailedReason: (string) (len=15) "InstallerFailed", 2025-12-05T10:40:39.809874568Z LastFailedCount: (int) 1, 2025-12-05T10:40:39.809874568Z LastFallbackCount: (int) 0, 2025-12-05T10:40:39.809874568Z LastFailedRevisionErrors: ([]string) (len=1 cap=1) { 2025-12-05T10:40:39.809874568Z (string) (len=2059) "installer: icy-controller-config\",\n (string) (len=29) \"controller-manager-kubeconfig\",\n (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=10) \"service-ca\",\n (string) (len=15) \"recycler-config\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"cloud-config\"\n },\n CertSecretNames: ([]string) (len=2 cap=2) {\n (string) (len=39) \"kube-controller-manager-client-cert-key\",\n (string) (len=10) \"csr-signer\"\n },\n OptionalCertSecretNamePrefixes: ([]string) ,\n CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) ,\n KubeletVersion: (string) \"\"\n})\nI1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\nI1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI1205 10:38:24.423067 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI1205 10:38:24.423082 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\nF1205 10:39:08.456301 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n" 2025-12-05T10:40:39.809874568Z } 2025-12-05T10:40:39.809874568Z } 2025-12-05T10:40:39.809874568Z because new revision pending 2025-12-05T10:40:39.812907786Z W1205 10:40:39.812817 1 dynamic_operator_client.go:352] .status.conditions["InstallerControllerDegraded"].reason is missing; this will eventually be fatal 2025-12-05T10:40:39.812907786Z W1205 10:40:39.812851 1 dynamic_operator_client.go:355] .status.conditions["InstallerControllerDegraded"].message is missing; this will eventually be fatal 2025-12-05T10:40:39.812907786Z W1205 10:40:39.812861 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2025-12-05T10:40:39.812907786Z W1205 10:40:39.812868 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2025-12-05T10:40:39.812907786Z W1205 10:40:39.812877 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2025-12-05T10:40:39.846287605Z I1205 10:40:39.846188 1 prune_controller.go:277] Nothing to prune 2025-12-05T10:40:39.847786184Z I1205 10:40:39.847711 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-05T10:37:38Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-05T10:38:20Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-05T10:37:40Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-05T10:37:38Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-05T10:37:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-05T10:40:39.869688897Z I1205 10:40:39.869318 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\nNodeInstallerDegraded: installer: icy-controller-config\",\nNodeInstallerDegraded: (string) (len=29) \"controller-manager-kubeconfig\",\nNodeInstallerDegraded: (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\nNodeInstallerDegraded: (string) (len=17) \"serviceaccount-ca\",\nNodeInstallerDegraded: (string) (len=10) \"service-ca\",\nNodeInstallerDegraded: (string) (len=15) \"recycler-config\"\nNodeInstallerDegraded: },\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=12) \"cloud-config\"\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=39) \"kube-controller-manager-client-cert-key\",\nNodeInstallerDegraded: (string) (len=10) \"csr-signer\"\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) ,\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\nNodeInstallerDegraded: (string) (len=20) \"aggregator-client-ca\",\nNodeInstallerDegraded: (string) (len=9) \"client-ca\"\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\nNodeInstallerDegraded: (string) (len=17) \"trusted-ca-bundle\"\nNodeInstallerDegraded: CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \"\",\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) ,\nNodeInstallerDegraded: KubeletVersion: (string) \"\"\nNodeInstallerDegraded: })\nNodeInstallerDegraded: I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\nNodeInstallerDegraded: I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nNodeInstallerDegraded: I1205 10:38:24.423067 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.423082 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nNodeInstallerDegraded: I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nNodeInstallerDegraded: I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\nNodeInstallerDegraded: F1205 10:39:08.456301 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nNodeInstallerDegraded: " to "NodeControllerDegraded: All master nodes are ready",Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2" 2025-12-05T10:40:40.205852383Z I1205 10:40:40.205785 1 request.go:700] Waited for 1.193263865s due to client-side throttling, not priority and fairness, request: DELETE:https://172.30.0.1:443/api/v1/namespaces/kube-system/serviceaccounts/vsphere-legacy-cloud-provider 2025-12-05T10:40:41.405714668Z I1205 10:40:41.405622 1 request.go:700] Waited for 1.183127854s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager 2025-12-05T10:40:41.610563833Z I1205 10:40:41.610484 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:41.610932322Z E1205 10:40:41.610827 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:42.016808773Z I1205 10:40:42.016729 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing 2025-12-05T10:40:43.205680885Z I1205 10:40:43.205581 1 request.go:700] Waited for 1.188881162s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0 2025-12-05T10:40:43.209579026Z I1205 10:40:43.209531 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2025-12-05T10:40:43.608633231Z I1205 10:40:43.608528 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:43.608633231Z E1205 10:40:43.608606 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:44.405027256Z I1205 10:40:44.404911 1 request.go:700] Waited for 1.187767053s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/installer-2-master-0 2025-12-05T10:40:45.410050354Z I1205 10:40:45.409963 1 request.go:700] Waited for 1.200781028s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods/kube-controller-manager-master-0 2025-12-05T10:40:45.608070774Z I1205 10:40:45.607991 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2025-12-05T10:40:46.007261012Z I1205 10:40:46.007178 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:46.007403916Z E1205 10:40:46.007363 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:47.208759199Z I1205 10:40:47.208650 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2025-12-05T10:40:47.608008459Z I1205 10:40:47.607906 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:47.608119192Z E1205 10:40:47.608072 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:49.012075682Z E1205 10:40:49.011986 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:49.012135164Z I1205 10:40:49.012072 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:49.485534923Z I1205 10:40:49.485474 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2025-12-05T10:40:50.407496583Z I1205 10:40:50.407399 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:50.407567014Z E1205 10:40:50.407538 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:51.607830170Z I1205 10:40:51.607755 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:51.607982333Z E1205 10:40:51.607946 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:53.008481884Z I1205 10:40:53.008367 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:40:53.008548176Z E1205 10:40:53.008528 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:58.808333972Z E1205 10:40:58.808265 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:40:58.808563979Z I1205 10:40:58.808525 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:41:09.268489268Z E1205 10:41:09.267978 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:41:09.268489268Z I1205 10:41:09.268305 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:41:30.914867494Z I1205 10:41:30.913964 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"versions":[{"name":"raw-internal","version":"4.18.29"},{"name":"kube-controller-manager","version":"1.31.13"},{"name":"operator","version":"4.18.29"}]}} 2025-12-05T10:41:30.914867494Z I1205 10:41:30.914295 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-controller-manager version "kube-controller-manager" changed from "" to "1.31.13" 2025-12-05T10:41:30.914867494Z I1205 10:41:30.914316 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-controller-manager version "operator" changed from "" to "4.18.29" 2025-12-05T10:41:30.928370902Z I1205 10:41:30.928238 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: status.versions changed from [{"raw-internal" "4.18.29"}] to [{"raw-internal" "4.18.29"} {"kube-controller-manager" "1.31.13"} {"operator" "4.18.29"}] 2025-12-05T10:41:30.928370902Z I1205 10:41:30.928318 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-controller-manager version "kube-controller-manager" changed from "" to "1.31.13" 2025-12-05T10:41:30.928370902Z I1205 10:41:30.928330 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorVersionChanged' clusteroperator/kube-controller-manager version "operator" changed from "" to "4.18.29" 2025-12-05T10:41:30.929047320Z I1205 10:41:30.928996 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"versions":[{"name":"raw-internal","version":"4.18.29"},{"name":"kube-controller-manager","version":"1.31.13"},{"name":"operator","version":"4.18.29"}]}} 2025-12-05T10:41:30.940107564Z I1205 10:41:30.934372 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Running phase 2025-12-05T10:41:30.940107564Z E1205 10:41:30.935251 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-controller-manager reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-controller-manager\": the object has been modified; please apply your changes to the latest version and try again" 2025-12-05T10:41:30.966061433Z E1205 10:41:30.966003 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: unexpected addresses: 192.168.32.10" 2025-12-05T10:41:30.966187596Z I1205 10:41:30.966151 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SATokenSignerControllerStuck' unexpected addresses: 192.168.32.10 2025-12-05T10:41:31.575286199Z I1205 10:41:31.575204 1 prune_controller.go:277] Nothing to prune 2025-12-05T10:41:31.575726890Z I1205 10:41:31.575682 1 status_controller.go:225] clusteroperator/kube-controller-manager diff {"status":{"conditions":[{"lastTransitionTime":"2025-12-05T10:37:38Z","message":"NodeControllerDegraded: All master nodes are ready\nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"cluster-policy-controller\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager-cert-syncer\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager-recovery-controller\" is waiting: ContainerCreating: ","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-12-05T10:38:20Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2025-12-05T10:37:40Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2025-12-05T10:37:38Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-12-05T10:37:38Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2025-12-05T10:41:31.592948954Z I1205 10:41:31.592871 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-controller-manager changed: Degraded message changed from "NodeControllerDegraded: All master nodes are ready" to "NodeControllerDegraded: All master nodes are ready\nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"cluster-policy-controller\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager-cert-syncer\" is waiting: ContainerCreating: \nStaticPodsDegraded: pod/kube-controller-manager-master-0 container \"kube-controller-manager-recovery-controller\" is waiting: ContainerCreating: " kube-controller-manager-operator_previous.log0000640000000000000000000004335615114533341044312 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-848f645654-rmdb82025-12-05T10:40:27.602452372Z I1205 10:40:27.598584 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2025-12-05T10:40:27.602452372Z I1205 10:40:27.598831 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.598848 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.598858 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.598862 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2025-12-05T10:40:27.602452372Z I1205 10:40:27.598872 1 base_controller.go:181] Shutting down LoggingSyncer ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.598881 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.599064 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2025-12-05T10:40:27.602452372Z I1205 10:40:27.599319 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.599470 1 base_controller.go:181] Shutting down Installer ... 2025-12-05T10:40:27.602452372Z W1205 10:40:27.601003 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2025-12-05T10:40:27.602452372Z W1205 10:40:27.601015 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2025-12-05T10:40:27.602452372Z W1205 10:40:27.601021 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2025-12-05T10:40:27.602452372Z E1205 10:40:27.601129 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-Installer\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601247 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601258 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601266 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601272 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601278 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601282 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601288 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601292 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601299 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601304 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601308 1 controller_manager.go:54] LoggingSyncer controller terminated 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601314 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601319 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601324 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601341 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2025-12-05T10:40:27.602452372Z I1205 10:40:27.601352 1 base_controller.go:181] Shutting down TargetConfigController ... 2025-12-05T10:40:27.602452372Z E1205 10:40:27.602213 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/namespace-openshift-infra.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-infra), \"assets/kube-controller-manager/svc.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/services/kube-controller-manager\": context canceled, \"assets/kube-controller-manager/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/recycler-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/csr_approver_clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:40:27.606448625Z I1205 10:40:27.602483 1 secure_serving.go:258] Stopped listening on [::]:8443 2025-12-05T10:40:27.606448625Z I1205 10:40:27.602522 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2025-12-05T10:40:27.606448625Z I1205 10:40:27.602548 1 base_controller.go:181] Shutting down RevisionController ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.602910 1 base_controller.go:181] Shutting down kube-controller-manager ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.602922 1 base_controller.go:181] Shutting down PruneController ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.602930 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.602939 1 base_controller.go:181] Shutting down ConfigObserver ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.602949 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.603387 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2025-12-05T10:40:27.606448625Z I1205 10:40:27.603570 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:40:27.606448625Z I1205 10:40:27.603588 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2025-12-05T10:40:27.606448625Z I1205 10:40:27.603600 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:40:27.606448625Z I1205 10:40:27.603663 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2025-12-05T10:40:27.606448625Z I1205 10:40:27.603676 1 base_controller.go:181] Shutting down SATokenSignerController ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604225 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604247 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604271 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604284 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604300 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604316 1 base_controller.go:181] Shutting down GuardController ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604328 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604369 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2435738318/tls.crt::/tmp/serving-cert-2435738318/tls.key" 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604397 1 base_controller.go:181] Shutting down CertRotationController ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604402 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604409 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2025-12-05T10:40:27.606448625Z E1205 10:40:27.604411 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-InstallerState reconciliation failed: client rate limiter Wait returned an error: context canceled" 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604445 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604452 1 base_controller.go:113] All GuardController workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604458 1 controller_manager.go:54] GuardController controller terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604458 1 base_controller.go:113] All CertRotationController workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604474 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604481 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604487 1 controller_manager.go:54] MissingStaticPodController controller terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604505 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604497 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 1 count 0 on node "master-0": client rate limiter Wait returned an error: context canceled 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604510 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604522 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604539 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604536 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604544 1 base_controller.go:113] All PruneController workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604556 1 controller_manager.go:54] PruneController controller terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604558 1 builder.go:335] server exited 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604524 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604569 1 base_controller.go:123] Shutting down worker of Installer controller ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604574 1 base_controller.go:113] All ConfigObserver workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604576 1 base_controller.go:113] All Installer workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604574 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604586 1 controller_manager.go:54] Installer controller terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604587 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.604663 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-controller-manager-operator", Name:"kube-controller-manager-operator", UID:"241c1ec6-2969-4a2d-bd61-7ace138fa28c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'SecretCreateFailed' Failed to create Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager: client rate limiter Wait returned an error: context canceled 2025-12-05T10:40:27.606448625Z W1205 10:40:27.605668 1 base_controller.go:242] Updating status of "RevisionController" failed: unable to ApplyStatus for operator using fieldManager "RevisionController-reportDegraded": client rate limiter Wait returned an error: context canceled 2025-12-05T10:40:27.606448625Z E1205 10:40:27.605698 1 base_controller.go:279] "Unhandled Error" err="RevisionController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2025-12-05T10:40:27.606448625Z I1205 10:40:27.605730 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2025-12-05T10:40:27.606448625Z I1205 10:40:27.605741 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2025-12-05T10:40:27.606448625Z I1205 10:40:27.605751 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2025-12-05T10:40:27.606448625Z E1205 10:40:27.605843 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2025-12-05T10:40:27.610448818Z E1205 10:40:27.606812 1 base_controller.go:279] "Unhandled Error" err="kube-controller-manager-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-controller-manager-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:40:27.610448818Z I1205 10:40:27.606835 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2025-12-05T10:40:27.610448818Z I1205 10:40:27.606852 1 base_controller.go:113] All RevisionController workers have been terminated 2025-12-05T10:40:27.610448818Z I1205 10:40:27.606858 1 controller_manager.go:54] RevisionController controller terminated 2025-12-05T10:40:27.610448818Z I1205 10:40:27.606869 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2025-12-05T10:40:27.610448818Z I1205 10:40:27.606874 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2025-12-05T10:40:27.610448818Z E1205 10:40:27.608053 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2025-12-05T10:40:27.610448818Z I1205 10:40:27.608077 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2025-12-05T10:40:27.610448818Z I1205 10:40:27.608085 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2025-12-05T10:40:27.610448818Z I1205 10:40:27.608090 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2025-12-05T10:40:27.610448818Z I1205 10:40:27.609877 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2025-12-05T10:40:27.610448818Z I1205 10:40:27.609891 1 base_controller.go:113] All TargetConfigController workers have been terminated 2025-12-05T10:40:28.780268349Z W1205 10:40:28.780177 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-848f645654-rmdb8.json0000640000000000000000000001451015114533341033220 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-848f645654-rmdb8","generateName":"kube-controller-manager-operator-848f645654-","namespace":"openshift-kube-controller-manager-operator","uid":"11f563d5-89bb-433c-956a-6d5d2492e8f1","resourceVersion":"8893","creationTimestamp":"2025-12-05T10:35:55Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"848f645654"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-848f645654","uid":"7ef72baf-9a04-4f9a-be22-97127fc319ad","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fa40d32981d88f32a9cdedc4cdd4a08c43e0d17bd4cc3fc3a87e9d1c7e1259d0"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.29"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.13"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:30Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:30Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2025-12-05T10:37:08Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2025-12-05T10:40:29Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-05T10:37:36Z","finishedAt":"2025-12-05T10:40:28Z","containerID":"cri-o://475c118c4e82c9f8f86c3034eb04eddc9ae813cf612425cd157e214036c29617"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","containerID":"cri-o://5d29cfb25e3c664f42b949f72a0cc8a81a2fbc483c367ef78fa4ab375de3d64d","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000011405515114533341031001 0ustar00000000000000002025-12-05T10:40:43.576570745Z (string) (len=10) "csr-signer" 2025-12-05T10:40:43.576570745Z }, 2025-12-05T10:40:43.576570745Z OptionalCertSecretNamePrefixes: ([]string) , 2025-12-05T10:40:43.576570745Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2025-12-05T10:40:43.576570745Z (string) (len=20) "aggregator-client-ca", 2025-12-05T10:40:43.576570745Z (string) (len=9) "client-ca" 2025-12-05T10:40:43.576570745Z }, 2025-12-05T10:40:43.576570745Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2025-12-05T10:40:43.576570745Z (string) (len=17) "trusted-ca-bundle" 2025-12-05T10:40:43.576570745Z }, 2025-12-05T10:40:43.576570745Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2025-12-05T10:40:43.576570745Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2025-12-05T10:40:43.576570745Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2025-12-05T10:40:43.576570745Z Timeout: (time.Duration) 2m0s, 2025-12-05T10:40:43.576570745Z StaticPodManifestsLockFile: (string) "", 2025-12-05T10:40:43.576570745Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2025-12-05T10:40:43.576570745Z KubeletVersion: (string) "" 2025-12-05T10:40:43.576570745Z }) 2025-12-05T10:40:43.667451035Z I1205 10:40:43.667332 1 cmd.go:413] Getting controller reference for node master-0 2025-12-05T10:40:43.676758024Z I1205 10:40:43.676708 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2025-12-05T10:40:43.676786195Z I1205 10:40:43.676770 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-05T10:40:43.676786195Z I1205 10:40:43.676781 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-05T10:40:43.680376438Z I1205 10:40:43.680284 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2025-12-05T10:41:13.681350554Z I1205 10:41:13.681269 1 cmd.go:524] Getting installer pods for node master-0 2025-12-05T10:41:13.685475690Z I1205 10:41:13.685399 1 cmd.go:542] Latest installer revision for node master-0 is: 2 2025-12-05T10:41:13.685475690Z I1205 10:41:13.685441 1 cmd.go:431] Querying kubelet version for node master-0 2025-12-05T10:41:13.687398579Z I1205 10:41:13.687359 1 cmd.go:444] Got kubelet version 1.31.13 on target node master-0 2025-12-05T10:41:13.687398579Z I1205 10:41:13.687384 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2025-12-05T10:41:13.687550263Z I1205 10:41:13.687521 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2025-12-05T10:41:13.687550263Z I1205 10:41:13.687538 1 cmd.go:229] Getting secrets ... 2025-12-05T10:41:13.689754150Z I1205 10:41:13.689727 1 copy.go:32] Got secret openshift-kube-controller-manager/localhost-recovery-client-token-2 2025-12-05T10:41:13.691920936Z I1205 10:41:13.691758 1 copy.go:32] Got secret openshift-kube-controller-manager/service-account-private-key-2 2025-12-05T10:41:13.694881322Z I1205 10:41:13.694840 1 copy.go:32] Got secret openshift-kube-controller-manager/serving-cert-2 2025-12-05T10:41:13.694881322Z I1205 10:41:13.694875 1 cmd.go:242] Getting config maps ... 2025-12-05T10:41:13.696728520Z I1205 10:41:13.696680 1 copy.go:60] Got configMap openshift-kube-controller-manager/cluster-policy-controller-config-2 2025-12-05T10:41:13.698479934Z I1205 10:41:13.698434 1 copy.go:60] Got configMap openshift-kube-controller-manager/config-2 2025-12-05T10:41:13.699991663Z I1205 10:41:13.699943 1 copy.go:60] Got configMap openshift-kube-controller-manager/controller-manager-kubeconfig-2 2025-12-05T10:41:13.701380969Z I1205 10:41:13.701334 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-cert-syncer-kubeconfig-2 2025-12-05T10:41:13.703633327Z I1205 10:41:13.703591 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-manager-pod-2 2025-12-05T10:41:13.946460439Z I1205 10:41:13.943741 1 copy.go:60] Got configMap openshift-kube-controller-manager/recycler-config-2 2025-12-05T10:41:14.102467467Z I1205 10:41:14.100200 1 copy.go:60] Got configMap openshift-kube-controller-manager/service-ca-2 2025-12-05T10:41:14.285681555Z I1205 10:41:14.285620 1 copy.go:60] Got configMap openshift-kube-controller-manager/serviceaccount-ca-2 2025-12-05T10:41:14.484312068Z I1205 10:41:14.484252 1 copy.go:52] Failed to get config map openshift-kube-controller-manager/cloud-config-2: configmaps "cloud-config-2" not found 2025-12-05T10:41:14.484312068Z I1205 10:41:14.484285 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token" ... 2025-12-05T10:41:14.484515435Z I1205 10:41:14.484482 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/ca.crt" ... 2025-12-05T10:41:14.484669198Z I1205 10:41:14.484633 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/namespace" ... 2025-12-05T10:41:14.484751180Z I1205 10:41:14.484721 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/token" ... 2025-12-05T10:41:14.484821372Z I1205 10:41:14.484800 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key" ... 2025-12-05T10:41:14.484869963Z I1205 10:41:14.484848 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key/service-account.key" ... 2025-12-05T10:41:14.484969686Z I1205 10:41:14.484928 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert" ... 2025-12-05T10:41:14.485002837Z I1205 10:41:14.484980 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.crt" ... 2025-12-05T10:41:14.485080789Z I1205 10:41:14.485058 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.key" ... 2025-12-05T10:41:14.485164071Z I1205 10:41:14.485137 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config" ... 2025-12-05T10:41:14.485250533Z I1205 10:41:14.485227 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config/config.yaml" ... 2025-12-05T10:41:14.485338375Z I1205 10:41:14.485312 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config" ... 2025-12-05T10:41:14.485409137Z I1205 10:41:14.485384 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config/config.yaml" ... 2025-12-05T10:41:14.485550870Z I1205 10:41:14.485524 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig" ... 2025-12-05T10:41:14.485613302Z I1205 10:41:14.485586 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig/kubeconfig" ... 2025-12-05T10:41:14.485692604Z I1205 10:41:14.485665 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig" ... 2025-12-05T10:41:14.485732005Z I1205 10:41:14.485716 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig" ... 2025-12-05T10:41:14.485812028Z I1205 10:41:14.485790 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod" ... 2025-12-05T10:41:14.485856639Z I1205 10:41:14.485835 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/forceRedeploymentReason" ... 2025-12-05T10:41:14.485932561Z I1205 10:41:14.485906 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/pod.yaml" ... 2025-12-05T10:41:14.486016273Z I1205 10:41:14.485995 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/version" ... 2025-12-05T10:41:14.486120576Z I1205 10:41:14.486095 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config" ... 2025-12-05T10:41:14.486206708Z I1205 10:41:14.486184 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config/recycler-pod.yaml" ... 2025-12-05T10:41:14.486294010Z I1205 10:41:14.486272 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca" ... 2025-12-05T10:41:14.486348081Z I1205 10:41:14.486323 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca/ca-bundle.crt" ... 2025-12-05T10:41:14.486446974Z I1205 10:41:14.486408 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca" ... 2025-12-05T10:41:14.486498445Z I1205 10:41:14.486477 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2025-12-05T10:41:14.486595588Z I1205 10:41:14.486570 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs" ... 2025-12-05T10:41:14.486651879Z I1205 10:41:14.486624 1 cmd.go:229] Getting secrets ... 2025-12-05T10:41:14.684712339Z I1205 10:41:14.684647 1 copy.go:32] Got secret openshift-kube-controller-manager/csr-signer 2025-12-05T10:41:14.884286397Z I1205 10:41:14.884238 1 copy.go:32] Got secret openshift-kube-controller-manager/kube-controller-manager-client-cert-key 2025-12-05T10:41:14.884286397Z I1205 10:41:14.884271 1 cmd.go:242] Getting config maps ... 2025-12-05T10:41:15.084770399Z I1205 10:41:15.084678 1 copy.go:60] Got configMap openshift-kube-controller-manager/aggregator-client-ca 2025-12-05T10:41:15.287122840Z I1205 10:41:15.287072 1 copy.go:60] Got configMap openshift-kube-controller-manager/client-ca 2025-12-05T10:41:15.496990664Z I1205 10:41:15.496914 1 copy.go:60] Got configMap openshift-kube-controller-manager/trusted-ca-bundle 2025-12-05T10:41:15.497581029Z I1205 10:41:15.497549 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer" ... 2025-12-05T10:41:15.497808655Z I1205 10:41:15.497787 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.key" ... 2025-12-05T10:41:15.498001310Z I1205 10:41:15.497976 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.crt" ... 2025-12-05T10:41:15.498147174Z I1205 10:41:15.498124 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key" ... 2025-12-05T10:41:15.498250377Z I1205 10:41:15.498212 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.crt" ... 2025-12-05T10:41:15.498389120Z I1205 10:41:15.498364 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.key" ... 2025-12-05T10:41:15.498582245Z I1205 10:41:15.498547 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca" ... 2025-12-05T10:41:15.498758269Z I1205 10:41:15.498717 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca/ca-bundle.crt" ... 2025-12-05T10:41:15.498898363Z I1205 10:41:15.498876 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca" ... 2025-12-05T10:41:15.498981465Z I1205 10:41:15.498961 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca/ca-bundle.crt" ... 2025-12-05T10:41:15.499147979Z I1205 10:41:15.499122 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle" ... 2025-12-05T10:41:15.567344366Z I1205 10:41:15.567265 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle/ca-bundle.crt" ... 2025-12-05T10:41:15.568073525Z I1205 10:41:15.568037 1 cmd.go:335] Getting pod configmaps/kube-controller-manager-pod-2 -n openshift-kube-controller-manager 2025-12-05T10:41:15.689374997Z I1205 10:41:15.689281 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2025-12-05T10:41:15.689374997Z I1205 10:41:15.689334 1 cmd.go:379] Writing a pod under "kube-controller-manager-pod.yaml" key 2025-12-05T10:41:15.689374997Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-lffcv --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=false --feature-gates=StreamingCollectionEncodingToProtobuf=false --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2025-12-05T10:41:15.697395434Z I1205 10:41:15.697309 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/kube-controller-manager-pod.yaml" ... 2025-12-05T10:41:15.767977281Z I1205 10:41:15.767899 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2025-12-05T10:41:15.767977281Z I1205 10:41:15.767935 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2025-12-05T10:41:15.767977281Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-lffcv --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=false --feature-gates=StreamingCollectionEncodingToProtobuf=false --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} config/pod/openshift-kube-controller-manager/logs/installer-1-master-0/installer_current.log0000640000000000000000000001443515114533341031001 0ustar00000000000000002025-12-05T10:38:24.269986325Z I1205 10:38:24.269722 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc000a6de00 cert-dir:0xc000a9e0a0 cert-secrets:0xc000a6dd60 configmaps:0xc000a6d900 namespace:0xc000a6d720 optional-cert-configmaps:0xc000a9e000 optional-configmaps:0xc000a6da40 optional-secrets:0xc000a6d9a0 pod:0xc000a6d7c0 pod-manifest-dir:0xc000a6db80 resource-dir:0xc000a6dae0 revision:0xc000a6d680 secrets:0xc000a6d860 v:0xc000a9eaa0] [0xc000a9eaa0 0xc000a6d680 0xc000a6d720 0xc000a6d7c0 0xc000a6dae0 0xc000a6db80 0xc000a6d900 0xc000a6da40 0xc000a6d860 0xc000a6d9a0 0xc000a9e0a0 0xc000a6de00 0xc000a9e000 0xc000a6dd60] [] map[cert-configmaps:0xc000a6de00 cert-dir:0xc000a9e0a0 cert-secrets:0xc000a6dd60 configmaps:0xc000a6d900 help:0xc000a9ee60 kubeconfig:0xc000a6d5e0 log-flush-frequency:0xc000a9ea00 namespace:0xc000a6d720 optional-cert-configmaps:0xc000a9e000 optional-cert-secrets:0xc000a6dea0 optional-configmaps:0xc000a6da40 optional-secrets:0xc000a6d9a0 pod:0xc000a6d7c0 pod-manifest-dir:0xc000a6db80 pod-manifests-lock-file:0xc000a6dcc0 resource-dir:0xc000a6dae0 revision:0xc000a6d680 secrets:0xc000a6d860 timeout-duration:0xc000a6dc20 v:0xc000a9eaa0 vmodule:0xc000a9eb40] [0xc000a6d5e0 0xc000a6d680 0xc000a6d720 0xc000a6d7c0 0xc000a6d860 0xc000a6d900 0xc000a6d9a0 0xc000a6da40 0xc000a6dae0 0xc000a6db80 0xc000a6dc20 0xc000a6dcc0 0xc000a6dd60 0xc000a6de00 0xc000a6dea0 0xc000a9e000 0xc000a9e0a0 0xc000a9ea00 0xc000a9eaa0 0xc000a9eb40 0xc000a9ee60] [0xc000a6de00 0xc000a9e0a0 0xc000a6dd60 0xc000a6d900 0xc000a9ee60 0xc000a6d5e0 0xc000a9ea00 0xc000a6d720 0xc000a9e000 0xc000a6dea0 0xc000a6da40 0xc000a6d9a0 0xc000a6d7c0 0xc000a6db80 0xc000a6dcc0 0xc000a6dae0 0xc000a6d680 0xc000a6d860 0xc000a6dc20 0xc000a9eaa0 0xc000a9eb40] map[104:0xc000a9ee60 118:0xc000a9eaa0] [] -1 0 0xc000a53320 true 0x77b500 []} 2025-12-05T10:38:24.270143800Z I1205 10:38:24.269989 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000a2e340)({ 2025-12-05T10:38:24.270143800Z KubeConfig: (string) "", 2025-12-05T10:38:24.270143800Z KubeClient: (kubernetes.Interface) , 2025-12-05T10:38:24.270143800Z Revision: (string) (len=1) "1", 2025-12-05T10:38:24.270143800Z NodeName: (string) "", 2025-12-05T10:38:24.270143800Z Namespace: (string) (len=33) "openshift-kube-controller-manager", 2025-12-05T10:38:24.270143800Z Clock: (clock.RealClock) { 2025-12-05T10:38:24.270143800Z }, 2025-12-05T10:38:24.270143800Z PodConfigMapNamePrefix: (string) (len=27) "kube-controller-manager-pod", 2025-12-05T10:38:24.270143800Z SecretNamePrefixes: ([]string) (len=2 cap=2) { 2025-12-05T10:38:24.270143800Z (string) (len=27) "service-account-private-key", 2025-12-05T10:38:24.270143800Z (string) (len=31) "localhost-recovery-client-token" 2025-12-05T10:38:24.270143800Z }, 2025-12-05T10:38:24.270143800Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2025-12-05T10:38:24.270143800Z (string) (len=12) "serving-cert" 2025-12-05T10:38:24.270143800Z }, 2025-12-05T10:38:24.270143800Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2025-12-05T10:38:24.270143800Z (string) (len=27) "kube-controller-manager-pod", 2025-12-05T10:38:24.270143800Z (string) (len=6) "config", 2025-12-05T10:38:24.270143800Z (string) (len=32) "cluster-policy-controller-config", 2025-12-05T10:38:24.270143800Z (string) (len=29) "controller-manager-kubeconfig", 2025-12-05T10:38:24.270143800Z (string) (len=38) "kube-controller-cert-syncer-kubeconfig", 2025-12-05T10:38:24.270143800Z (string) (len=17) "serviceaccount-ca", 2025-12-05T10:38:24.270143800Z (string) (len=10) "service-ca", 2025-12-05T10:38:24.270143800Z (string) (len=15) "recycler-config" 2025-12-05T10:38:24.270143800Z }, 2025-12-05T10:38:24.270143800Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2025-12-05T10:38:24.270143800Z (string) (len=12) "cloud-config" 2025-12-05T10:38:24.270143800Z }, 2025-12-05T10:38:24.270143800Z CertSecretNames: ([]string) (len=2 cap=2) { 2025-12-05T10:38:24.270143800Z (string) (len=39) "kube-controller-manager-client-cert-key", 2025-12-05T10:38:24.270143800Z (string) (len=10) "csr-signer" 2025-12-05T10:38:24.270143800Z }, 2025-12-05T10:38:24.270143800Z OptionalCertSecretNamePrefixes: ([]string) , 2025-12-05T10:38:24.270143800Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2025-12-05T10:38:24.270143800Z (string) (len=20) "aggregator-client-ca", 2025-12-05T10:38:24.270143800Z (string) (len=9) "client-ca" 2025-12-05T10:38:24.270143800Z }, 2025-12-05T10:38:24.270143800Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2025-12-05T10:38:24.270143800Z (string) (len=17) "trusted-ca-bundle" 2025-12-05T10:38:24.270143800Z }, 2025-12-05T10:38:24.270143800Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2025-12-05T10:38:24.270143800Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2025-12-05T10:38:24.270143800Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2025-12-05T10:38:24.270143800Z Timeout: (time.Duration) 2m0s, 2025-12-05T10:38:24.270143800Z StaticPodManifestsLockFile: (string) "", 2025-12-05T10:38:24.270143800Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2025-12-05T10:38:24.270143800Z KubeletVersion: (string) "" 2025-12-05T10:38:24.270143800Z }) 2025-12-05T10:38:24.270783088Z I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0 2025-12-05T10:38:24.428535008Z I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2025-12-05T10:38:24.428535008Z I1205 10:38:24.423067 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-05T10:38:24.428535008Z I1205 10:38:24.423082 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-05T10:38:24.447807053Z I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2025-12-05T10:38:54.452648338Z I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0 2025-12-05T10:39:08.456498650Z F1205 10:39:08.456301 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-controller-manager/installer-1-master-0.json0000640000000000000000000001716115114533341024465 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-controller-manager","uid":"738d9fe7-2d08-4aa4-842b-9cbeddf120fb","resourceVersion":"8763","creationTimestamp":"2025-12-05T10:38:22Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.47/23\"],\"mac_address\":\"0a:58:0a:80:00:2f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.47/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.47\"\n ],\n \"mac\": \"0a:58:0a:80:00:2f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"21d631b7-d4d5-4e5a-84b3-ddfb79bd54ee"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","command":["cluster-kube-controller-manager-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-controller-manager","--pod=kube-controller-manager-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-controller-manager-pod","--configmaps=config","--configmaps=cluster-policy-controller-config","--configmaps=controller-manager-kubeconfig","--optional-configmaps=cloud-config","--configmaps=kube-controller-cert-syncer-kubeconfig","--configmaps=serviceaccount-ca","--configmaps=service-ca","--configmaps=recycler-config","--secrets=service-account-private-key","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-controller-manager-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-secrets=kube-controller-manager-client-cert-key","--cert-secrets=csr-signer"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:27Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:22Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:26Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:26Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:22Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.47","podIPs":[{"ip":"10.128.0.47"}],"startTime":"2025-12-05T10:38:22Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"icy-controller-config\",\n (string) (len=29) \"controller-manager-kubeconfig\",\n (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=10) \"service-ca\",\n (string) (len=15) \"recycler-config\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"cloud-config\"\n },\n CertSecretNames: ([]string) (len=2 cap=2) {\n (string) (len=39) \"kube-controller-manager-client-cert-key\",\n (string) (len=10) \"csr-signer\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\nI1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI1205 10:38:24.423067 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI1205 10:38:24.423082 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\nF1205 10:39:08.456301 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2025-12-05T10:38:23Z","finishedAt":"2025-12-05T10:39:08Z","containerID":"cri-o://8a8e52c1bfb7c50d31dbfbb099e72a94f8cf7f5c9eac30d42a9e7bb6f30721bf"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","containerID":"cri-o://8a8e52c1bfb7c50d31dbfbb099e72a94f8cf7f5c9eac30d42a9e7bb6f30721bf","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715114533341027203 0ustar00000000000000002025-12-05T10:38:21.776380217Z I1205 10:38:21.776091 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc0004845a0 cert-dir:0xc000484a00 cert-secrets:0xc000484460 configmaps:0xc0002b72c0 namespace:0xc0002b6f00 optional-cert-configmaps:0xc0004848c0 optional-cert-secrets:0xc0004846e0 optional-configmaps:0xc0002b7540 optional-secrets:0xc0002b7400 pod:0xc0002b7040 pod-manifest-dir:0xc0002b7860 resource-dir:0xc0002b7720 revision:0xc0002b6dc0 secrets:0xc0002b7180 v:0xc000baabe0] [0xc000baabe0 0xc0002b6dc0 0xc0002b6f00 0xc0002b7040 0xc0002b7720 0xc0002b7860 0xc0002b72c0 0xc0002b7540 0xc0002b7180 0xc0002b7400 0xc000484a00 0xc0004845a0 0xc0004848c0 0xc000484460 0xc0004846e0] [] map[cert-configmaps:0xc0004845a0 cert-dir:0xc000484a00 cert-secrets:0xc000484460 configmaps:0xc0002b72c0 help:0xc000baafa0 kubeconfig:0xc0002b6b40 log-flush-frequency:0xc000baab40 namespace:0xc0002b6f00 optional-cert-configmaps:0xc0004848c0 optional-cert-secrets:0xc0004846e0 optional-configmaps:0xc0002b7540 optional-secrets:0xc0002b7400 pod:0xc0002b7040 pod-manifest-dir:0xc0002b7860 pod-manifests-lock-file:0xc0004840a0 resource-dir:0xc0002b7720 revision:0xc0002b6dc0 secrets:0xc0002b7180 timeout-duration:0xc0002b7ae0 v:0xc000baabe0 vmodule:0xc000baac80] [0xc0002b6b40 0xc0002b6dc0 0xc0002b6f00 0xc0002b7040 0xc0002b7180 0xc0002b72c0 0xc0002b7400 0xc0002b7540 0xc0002b7720 0xc0002b7860 0xc0002b7ae0 0xc0004840a0 0xc000484460 0xc0004845a0 0xc0004846e0 0xc0004848c0 0xc000484a00 0xc000baab40 0xc000baabe0 0xc000baac80 0xc000baafa0] [0xc0004845a0 0xc000484a00 0xc000484460 0xc0002b72c0 0xc000baafa0 0xc0002b6b40 0xc000baab40 0xc0002b6f00 0xc0004848c0 0xc0004846e0 0xc0002b7540 0xc0002b7400 0xc0002b7040 0xc0002b7860 0xc0004840a0 0xc0002b7720 0xc0002b6dc0 0xc0002b7180 0xc0002b7ae0 0xc000baabe0 0xc000baac80] map[104:0xc000baafa0 118:0xc000baabe0] [] -1 0 0xc000b94390 true 0xae1c20 []} 2025-12-05T10:38:21.776548322Z I1205 10:38:21.776394 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000b9e340)({ 2025-12-05T10:38:21.776548322Z KubeConfig: (string) "", 2025-12-05T10:38:21.776548322Z KubeClient: (kubernetes.Interface) , 2025-12-05T10:38:21.776548322Z Revision: (string) (len=1) "1", 2025-12-05T10:38:21.776548322Z NodeName: (string) "", 2025-12-05T10:38:21.776548322Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2025-12-05T10:38:21.776548322Z Clock: (clock.RealClock) { 2025-12-05T10:38:21.776548322Z }, 2025-12-05T10:38:21.776548322Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2025-12-05T10:38:21.776548322Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2025-12-05T10:38:21.776548322Z (string) (len=11) "etcd-client", 2025-12-05T10:38:21.776548322Z (string) (len=34) "localhost-recovery-serving-certkey", 2025-12-05T10:38:21.776548322Z (string) (len=31) "localhost-recovery-client-token" 2025-12-05T10:38:21.776548322Z }, 2025-12-05T10:38:21.776548322Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2025-12-05T10:38:21.776548322Z (string) (len=17) "encryption-config", 2025-12-05T10:38:21.776548322Z (string) (len=21) "webhook-authenticator" 2025-12-05T10:38:21.776548322Z }, 2025-12-05T10:38:21.776548322Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2025-12-05T10:38:21.776548322Z (string) (len=18) "kube-apiserver-pod", 2025-12-05T10:38:21.776548322Z (string) (len=6) "config", 2025-12-05T10:38:21.776548322Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2025-12-05T10:38:21.776548322Z (string) (len=28) "bound-sa-token-signing-certs", 2025-12-05T10:38:21.776548322Z (string) (len=15) "etcd-serving-ca", 2025-12-05T10:38:21.776548322Z (string) (len=18) "kubelet-serving-ca", 2025-12-05T10:38:21.776548322Z (string) (len=22) "sa-token-signing-certs", 2025-12-05T10:38:21.776548322Z (string) (len=29) "kube-apiserver-audit-policies" 2025-12-05T10:38:21.776548322Z }, 2025-12-05T10:38:21.776548322Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2025-12-05T10:38:21.776548322Z (string) (len=14) "oauth-metadata", 2025-12-05T10:38:21.776548322Z (string) (len=12) "cloud-config", 2025-12-05T10:38:21.776548322Z (string) (len=24) "kube-apiserver-server-ca" 2025-12-05T10:38:21.776548322Z }, 2025-12-05T10:38:21.776548322Z CertSecretNames: ([]string) (len=10 cap=16) { 2025-12-05T10:38:21.776548322Z (string) (len=17) "aggregator-client", 2025-12-05T10:38:21.776548322Z (string) (len=30) "localhost-serving-cert-certkey", 2025-12-05T10:38:21.776548322Z (string) (len=31) "service-network-serving-certkey", 2025-12-05T10:38:21.776548322Z (string) (len=37) "external-loadbalancer-serving-certkey", 2025-12-05T10:38:21.776548322Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2025-12-05T10:38:21.776548322Z (string) (len=33) "bound-service-account-signing-key", 2025-12-05T10:38:21.776548322Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2025-12-05T10:38:21.776548322Z (string) (len=31) "check-endpoints-client-cert-key", 2025-12-05T10:38:21.776548322Z (string) (len=14) "kubelet-client", 2025-12-05T10:38:21.776548322Z (string) (len=16) "node-kubeconfigs" 2025-12-05T10:38:21.776548322Z }, 2025-12-05T10:38:21.776548322Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2025-12-05T10:38:21.776548322Z (string) (len=17) "user-serving-cert", 2025-12-05T10:38:21.776548322Z (string) (len=21) "user-serving-cert-000", 2025-12-05T10:38:21.776548322Z (string) (len=21) "user-serving-cert-001", 2025-12-05T10:38:21.776548322Z (string) (len=21) "user-serving-cert-002", 2025-12-05T10:38:21.776548322Z (string) (len=21) "user-serving-cert-003", 2025-12-05T10:38:21.776548322Z (string) (len=21) "user-serving-cert-004", 2025-12-05T10:38:21.776548322Z (string) (len=21) "user-serving-cert-005", 2025-12-05T10:38:21.776548322Z (string) (len=21) "user-serving-cert-006", 2025-12-05T10:38:21.776548322Z (string) (len=21) "user-serving-cert-007", 2025-12-05T10:38:21.776548322Z (string) (len=21) "user-serving-cert-008", 2025-12-05T10:38:21.776548322Z (string) (len=21) "user-serving-cert-009" 2025-12-05T10:38:21.776548322Z }, 2025-12-05T10:38:21.776548322Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2025-12-05T10:38:21.776548322Z (string) (len=20) "aggregator-client-ca", 2025-12-05T10:38:21.776548322Z (string) (len=9) "client-ca", 2025-12-05T10:38:21.776548322Z (string) (len=29) "control-plane-node-kubeconfig", 2025-12-05T10:38:21.776548322Z (string) (len=26) "check-endpoints-kubeconfig" 2025-12-05T10:38:21.776548322Z }, 2025-12-05T10:38:21.776548322Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2025-12-05T10:38:21.776548322Z (string) (len=17) "trusted-ca-bundle" 2025-12-05T10:38:21.776548322Z }, 2025-12-05T10:38:21.776548322Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2025-12-05T10:38:21.776548322Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2025-12-05T10:38:21.776548322Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2025-12-05T10:38:21.776548322Z Timeout: (time.Duration) 2m0s, 2025-12-05T10:38:21.776548322Z StaticPodManifestsLockFile: (string) "", 2025-12-05T10:38:21.776548322Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2025-12-05T10:38:21.776548322Z KubeletVersion: (string) "" 2025-12-05T10:38:21.776548322Z }) 2025-12-05T10:38:21.777113228Z I1205 10:38:21.777060 1 cmd.go:413] Getting controller reference for node master-0 2025-12-05T10:38:21.787681196Z I1205 10:38:21.787618 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2025-12-05T10:38:21.787754348Z I1205 10:38:21.787704 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-05T10:38:21.787754348Z I1205 10:38:21.787737 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-05T10:38:21.790023473Z I1205 10:38:21.789987 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2025-12-05T10:38:51.790406737Z I1205 10:38:51.790332 1 cmd.go:524] Getting installer pods for node master-0 2025-12-05T10:39:05.794459915Z F1205 10:39:05.794193 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115114533341022663 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"5d8c854f-31f8-42d3-b28c-82c7d1b14ee9","resourceVersion":"8774","creationTimestamp":"2025-12-05T10:38:20Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.44/23\"],\"mac_address\":\"0a:58:0a:80:00:2c\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.44/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.44\"\n ],\n \"mac\": \"0a:58:0a:80:00:2c\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"12bb4923-1423-47a3-a988-f0d9dabdd0e9"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:27Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:20Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:26Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:26Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:20Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.44","podIPs":[{"ip":"10.128.0.44"}],"startTime":"2025-12-05T10:38:20Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI1205 10:38:21.777060 1 cmd.go:413] Getting controller reference for node master-0\nI1205 10:38:21.787618 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI1205 10:38:21.787704 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI1205 10:38:21.787737 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI1205 10:38:21.789987 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI1205 10:38:51.790332 1 cmd.go:524] Getting installer pods for node master-0\nF1205 10:39:05.794193 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2025-12-05T10:38:21Z","finishedAt":"2025-12-05T10:39:06Z","containerID":"cri-o://0d4c12890814d7bd72e2d33d03a6131a3d52c0e2122d3701215dc96f26a231b2"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","containerID":"cri-o://0d4c12890814d7bd72e2d33d03a6131a3d52c0e2122d3701215dc96f26a231b2","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615114533341035763 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02025-12-05T10:35:34.306182467Z I1205 10:35:34.306004 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000006571315114533341032667 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02025-12-05T10:41:30.910554533Z Trace[821562298]: [1.026712397s] [1.026712397s] END 2025-12-05T10:41:30.910576124Z I1205 10:41:30.910544 1 trace.go:236] Trace[1058149000]: "Update" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:f6db255f-57aa-4c85-9224-744ea484bcf7,client:10.128.0.46,api-group:coordination.k8s.io,api-version:v1,name:openshift-route-controllers,subresource:,namespace:openshift-route-controller-manager,protocol:HTTP/2.0,resource:leases,scope:resource,url:/apis/coordination.k8s.io/v1/namespaces/openshift-route-controller-manager/leases/openshift-route-controllers,user-agent:route-controller-manager/v0.0.0 (linux/amd64) kubernetes/$Format,verb:PUT (05-Dec-2025 10:41:28.804) (total time: 2106ms): 2025-12-05T10:41:30.910576124Z Trace[1058149000]: ["GuaranteedUpdate etcd3" audit-id:f6db255f-57aa-4c85-9224-744ea484bcf7,key:/leases/openshift-route-controller-manager/openshift-route-controllers,type:*coordination.Lease,resource:leases.coordination.k8s.io 2106ms (10:41:28.804) 2025-12-05T10:41:30.910576124Z Trace[1058149000]: ---"Txn call completed" 2104ms (10:41:30.910)] 2025-12-05T10:41:30.910576124Z Trace[1058149000]: [2.106452568s] [2.106452568s] END 2025-12-05T10:41:30.910647305Z I1205 10:41:30.910617 1 trace.go:236] Trace[367718476]: "List" accept:application/json, */*,audit-id:9821a0fb-291a-4f58-b636-8fc70b8c1bc0,client:10.128.0.64,api-group:machineconfiguration.openshift.io,api-version:v1,name:,subresource:,namespace:,protocol:HTTP/2.0,resource:machineosconfigs,scope:cluster,url:/apis/machineconfiguration.openshift.io/v1/machineosconfigs,user-agent:machine-config-controller/v0.0.0 (linux/amd64) kubernetes/$Format/node-update-controller,verb:LIST (05-Dec-2025 10:41:19.500) (total time: 11409ms): 2025-12-05T10:41:30.910647305Z Trace[367718476]: ["List(recursive=false) etcd3" audit-id:9821a0fb-291a-4f58-b636-8fc70b8c1bc0,key:/machineconfiguration.openshift.io/machineosconfigs,resourceVersion:,resourceVersionMatch:,limit:1,continue: 11409ms (10:41:19.500)] 2025-12-05T10:41:30.910647305Z Trace[367718476]: [11.409775527s] [11.409775527s] END 2025-12-05T10:41:30.910757208Z I1205 10:41:30.910726 1 trace.go:236] Trace[1178942385]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:0f0fa90a-e7ac-41e7-98f3-cd6bf4b7adc5,client:192.168.32.10,api-group:rbac.authorization.k8s.io,api-version:v1,name:prometheus-k8s-machine-api-operator,subresource:,namespace:openshift-machine-api,protocol:HTTP/2.0,resource:rolebindings,scope:resource,url:/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-machine-api/rolebindings/prometheus-k8s-machine-api-operator,user-agent:cluster-version-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:19.500) (total time: 11410ms): 2025-12-05T10:41:30.910757208Z Trace[1178942385]: ---"About to write a response" 11410ms (10:41:30.910) 2025-12-05T10:41:30.910757208Z Trace[1178942385]: [11.410185127s] [11.410185127s] END 2025-12-05T10:41:30.910757208Z I1205 10:41:30.910745 1 trace.go:236] Trace[1624547793]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:fdcd9b3f-a742-46b7-a1e4-0cb2c013aaaa,client:10.128.0.25,api-group:,api-version:v1,name:kube-controller-manager-master-0,subresource:,namespace:openshift-kube-controller-manager,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-kube-controller-manager/pods/kube-controller-manager-master-0,user-agent:cluster-kube-controller-manager-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:22.069) (total time: 8840ms): 2025-12-05T10:41:30.910757208Z Trace[1624547793]: ---"About to write a response" 8840ms (10:41:30.910) 2025-12-05T10:41:30.910757208Z Trace[1624547793]: [8.840748238s] [8.840748238s] END 2025-12-05T10:41:30.911003315Z I1205 10:41:30.910955 1 trace.go:236] Trace[37324910]: "Get" accept:application/vnd.kubernetes.protobuf, */*,audit-id:60f206a3-85a7-4e2e-a605-6e3118d91219,client:::1,api-group:coordination.k8s.io,api-version:v1,name:kube-scheduler,subresource:,namespace:kube-system,protocol:HTTP/2.0,resource:leases,scope:resource,url:/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler,user-agent:kube-scheduler/v1.31.13 (linux/amd64) kubernetes/de7bf74/leader-election,verb:GET (05-Dec-2025 10:41:26.410) (total time: 4500ms): 2025-12-05T10:41:30.911003315Z Trace[37324910]: ---"About to write a response" 4500ms (10:41:30.910) 2025-12-05T10:41:30.911003315Z Trace[37324910]: [4.500879382s] [4.500879382s] END 2025-12-05T10:41:30.911322643Z I1205 10:41:30.911296 1 trace.go:236] Trace[861576103]: "Get" accept:application/json, */*,audit-id:33ef13ab-8fad-467f-ad08-80d17cddaa73,client:192.168.32.254,api-group:config.openshift.io,api-version:v1,name:version,subresource:,namespace:,protocol:HTTP/2.0,resource:clusterversions,scope:resource,url:/apis/config.openshift.io/v1/clusterversions/version,user-agent:openshift-install/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:21.503) (total time: 9407ms): 2025-12-05T10:41:30.911322643Z Trace[861576103]: ---"About to write a response" 9406ms (10:41:30.910) 2025-12-05T10:41:30.911322643Z Trace[861576103]: [9.407286216s] [9.407286216s] END 2025-12-05T10:41:30.911746704Z I1205 10:41:30.911699 1 trace.go:236] Trace[1783962585]: "List" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:a07cfe1a-5f26-4b49-b9aa-d351edff4511,client:10.128.0.25,api-group:,api-version:v1,name:,subresource:,namespace:openshift-kube-controller-manager,protocol:HTTP/2.0,resource:pods,scope:namespace,url:/api/v1/namespaces/openshift-kube-controller-manager/pods,user-agent:cluster-kube-controller-manager-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:LIST (05-Dec-2025 10:41:22.069) (total time: 8842ms): 2025-12-05T10:41:30.911746704Z Trace[1783962585]: ["List(recursive=false) etcd3" audit-id:a07cfe1a-5f26-4b49-b9aa-d351edff4511,key:/pods,resourceVersion:,resourceVersionMatch:,limit:1,continue: 8842ms (10:41:22.069)] 2025-12-05T10:41:30.911746704Z Trace[1783962585]: [8.842304298s] [8.842304298s] END 2025-12-05T10:41:30.911776775Z I1205 10:41:30.911759 1 trace.go:236] Trace[1571967979]: "Get" accept:application/json, */*,audit-id:e80d5bea-b52c-4e89-af3e-ea35dcf17fb1,client:10.128.0.52,api-group:config.openshift.io,api-version:v1,name:operator-lifecycle-manager-catalog,subresource:,namespace:,protocol:HTTP/2.0,resource:clusteroperators,scope:resource,url:/apis/config.openshift.io/v1/clusteroperators/operator-lifecycle-manager-catalog,user-agent:catalog/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:20.043) (total time: 10868ms): 2025-12-05T10:41:30.911776775Z Trace[1571967979]: ---"About to write a response" 10867ms (10:41:30.911) 2025-12-05T10:41:30.911776775Z Trace[1571967979]: [10.868046188s] [10.868046188s] END 2025-12-05T10:41:30.911953709Z I1205 10:41:30.911905 1 trace.go:236] Trace[184826821]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:9a522964-9dbd-419e-baf4-a80457a34969,client:192.168.32.10,api-group:,api-version:v1,name:prometheus-operator-admission-webhook-7c85c4dffd-vjvbz,subresource:,namespace:openshift-monitoring,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-monitoring/pods/prometheus-operator-admission-webhook-7c85c4dffd-vjvbz,user-agent:kubelet/v1.31.13 (linux/amd64) kubernetes/de7bf74,verb:GET (05-Dec-2025 10:41:19.597) (total time: 11314ms): 2025-12-05T10:41:30.911953709Z Trace[184826821]: ---"About to write a response" 11313ms (10:41:30.910) 2025-12-05T10:41:30.911953709Z Trace[184826821]: [11.314576086s] [11.314576086s] END 2025-12-05T10:41:30.912799991Z I1205 10:41:30.912737 1 trace.go:236] Trace[1214906177]: "Get" accept:application/json, */*,audit-id:da232948-84c1-493c-b80d-e486000797c6,client:10.128.0.50,api-group:config.openshift.io,api-version:v1,name:cluster-autoscaler,subresource:,namespace:,protocol:HTTP/2.0,resource:clusteroperators,scope:resource,url:/apis/config.openshift.io/v1/clusteroperators/cluster-autoscaler,user-agent:cluster-autoscaler-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:19.500) (total time: 11412ms): 2025-12-05T10:41:30.912799991Z Trace[1214906177]: ---"About to write a response" 11412ms (10:41:30.912) 2025-12-05T10:41:30.912799991Z Trace[1214906177]: [11.412479627s] [11.412479627s] END 2025-12-05T10:41:30.915477100Z I1205 10:41:30.915439 1 trace.go:236] Trace[968523854]: "Update" accept:application/json, */*,audit-id:674a48df-748b-4dd5-a0d6-7c8fd4ca4fb9,client:10.128.0.58,api-group:coordination.k8s.io,api-version:v1,name:cluster-baremetal-operator,subresource:,namespace:openshift-machine-api,protocol:HTTP/2.0,resource:leases,scope:resource,url:/apis/coordination.k8s.io/v1/namespaces/openshift-machine-api/leases/cluster-baremetal-operator,user-agent:cluster-baremetal-operator/v0.0.0 (linux/amd64) kubernetes/$Format/leader-election,verb:PUT (05-Dec-2025 10:41:30.362) (total time: 553ms): 2025-12-05T10:41:30.915477100Z Trace[968523854]: ["GuaranteedUpdate etcd3" audit-id:674a48df-748b-4dd5-a0d6-7c8fd4ca4fb9,key:/leases/openshift-machine-api/cluster-baremetal-operator,type:*coordination.Lease,resource:leases.coordination.k8s.io 553ms (10:41:30.362) 2025-12-05T10:41:30.915477100Z Trace[968523854]: ---"Txn call completed" 552ms (10:41:30.915)] 2025-12-05T10:41:30.915477100Z Trace[968523854]: [553.327667ms] [553.327667ms] END 2025-12-05T10:41:30.917974775Z I1205 10:41:30.917924 1 trace.go:236] Trace[2072850127]: "Get" accept:application/json,audit-id:8754a89f-90c3-4ed5-97b7-d97be550c748,client:10.128.0.25,api-group:operator.openshift.io,api-version:v1,name:cluster,subresource:,namespace:,protocol:HTTP/2.0,resource:kubecontrollermanagers,scope:resource,url:/apis/operator.openshift.io/v1/kubecontrollermanagers/cluster,user-agent:cluster-kube-controller-manager-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:22.069) (total time: 8847ms): 2025-12-05T10:41:30.917974775Z Trace[2072850127]: ---"About to write a response" 8847ms (10:41:30.917) 2025-12-05T10:41:30.917974775Z Trace[2072850127]: [8.847903133s] [8.847903133s] END 2025-12-05T10:41:30.918077387Z I1205 10:41:30.918054 1 trace.go:236] Trace[2035112875]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:5ae53b52-24dd-4419-bb9d-9ef1bc7119af,client:10.128.0.25,api-group:rbac.authorization.k8s.io,api-version:v1,name:system:openshift:controller:privileged-namespaces-psa-label-syncer,subresource:,namespace:,protocol:HTTP/2.0,resource:clusterrolebindings,scope:resource,url:/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:controller:privileged-namespaces-psa-label-syncer,user-agent:cluster-kube-controller-manager-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:29.700) (total time: 1217ms): 2025-12-05T10:41:30.918077387Z Trace[2035112875]: ---"About to write a response" 1217ms (10:41:30.917) 2025-12-05T10:41:30.918077387Z Trace[2035112875]: [1.217087999s] [1.217087999s] END 2025-12-05T10:41:30.918814786Z I1205 10:41:30.918778 1 trace.go:236] Trace[682025517]: "Get" accept:application/json, */*,audit-id:2facf428-a7f0-4f79-9a17-a0a5608ef53a,client:10.128.0.16,api-group:apps,api-version:v1,name:prometheus-operator-admission-webhook,subresource:,namespace:openshift-monitoring,protocol:HTTP/2.0,resource:deployments,scope:resource,url:/apis/apps/v1/namespaces/openshift-monitoring/deployments/prometheus-operator-admission-webhook,user-agent:operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:29.700) (total time: 1218ms): 2025-12-05T10:41:30.918814786Z Trace[682025517]: ---"About to write a response" 1217ms (10:41:30.918) 2025-12-05T10:41:30.918814786Z Trace[682025517]: [1.218153836s] [1.218153836s] END 2025-12-05T10:41:30.918880437Z I1205 10:41:30.918867 1 trace.go:236] Trace[1622379562]: "List" accept:application/json, */*,audit-id:20e5d217-c2b4-47b9-9775-2fb7835fb8e5,client:10.128.0.17,api-group:admissionregistration.k8s.io,api-version:v1,name:,subresource:,namespace:,protocol:HTTP/2.0,resource:validatingwebhookconfigurations,scope:cluster,url:/apis/admissionregistration.k8s.io/v1/validatingwebhookconfigurations,user-agent:olm/v0.0.0 (linux/amd64) kubernetes/$Format,verb:LIST (05-Dec-2025 10:41:29.702) (total time: 1216ms): 2025-12-05T10:41:30.918880437Z Trace[1622379562]: ["List(recursive=false) etcd3" audit-id:20e5d217-c2b4-47b9-9775-2fb7835fb8e5,key:/validatingwebhookconfigurations,resourceVersion:,resourceVersionMatch:,limit:1,continue: 1216ms (10:41:29.702)] 2025-12-05T10:41:30.918880437Z Trace[1622379562]: [1.216240646s] [1.216240646s] END 2025-12-05T10:41:30.919138604Z I1205 10:41:30.919083 1 trace.go:236] Trace[239465028]: "Get" accept:application/json, */*,audit-id:7f8ac2d7-74c2-444d-9895-f4f9176642a0,client:192.168.32.10,api-group:operators.coreos.com,api-version:v1,name:global-operators,subresource:,namespace:openshift-operators,protocol:HTTP/2.0,resource:operatorgroups,scope:resource,url:/apis/operators.coreos.com/v1/namespaces/openshift-operators/operatorgroups/global-operators,user-agent:cluster-version-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:29.697) (total time: 1221ms): 2025-12-05T10:41:30.919138604Z Trace[239465028]: ---"About to write a response" 1221ms (10:41:30.918) 2025-12-05T10:41:30.919138604Z Trace[239465028]: [1.221363068s] [1.221363068s] END 2025-12-05T10:41:30.919583336Z I1205 10:41:30.919547 1 trace.go:236] Trace[976850518]: "Patch" accept:application/json, */*,audit-id:50ab3165-9c1d-4abd-874f-f768d9b9b5ec,client:10.128.0.64,api-group:,api-version:v1,name:master-0,subresource:,namespace:,protocol:HTTP/2.0,resource:nodes,scope:resource,url:/api/v1/nodes/master-0,user-agent:machine-config-controller/v0.0.0 (linux/amd64) kubernetes/$Format/node-update-controller,verb:PATCH (05-Dec-2025 10:41:29.702) (total time: 1217ms): 2025-12-05T10:41:30.919583336Z Trace[976850518]: ["GuaranteedUpdate etcd3" audit-id:50ab3165-9c1d-4abd-874f-f768d9b9b5ec,key:/minions/master-0,type:*core.Node,resource:nodes 1217ms (10:41:29.702)] 2025-12-05T10:41:30.919583336Z Trace[976850518]: ---"Object stored in database" 1214ms (10:41:30.919) 2025-12-05T10:41:30.919583336Z Trace[976850518]: [1.217357856s] [1.217357856s] END 2025-12-05T10:41:30.919826282Z I1205 10:41:30.919784 1 trace.go:236] Trace[413837931]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:736eed58-f1d9-490e-bb8c-c9e8fdef8862,client:10.128.0.25,api-group:,api-version:v1,name:installer-sa,subresource:,namespace:openshift-kube-controller-manager,protocol:HTTP/2.0,resource:serviceaccounts,scope:resource,url:/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa,user-agent:cluster-kube-controller-manager-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:30.011) (total time: 908ms): 2025-12-05T10:41:30.919826282Z Trace[413837931]: ---"About to write a response" 908ms (10:41:30.919) 2025-12-05T10:41:30.919826282Z Trace[413837931]: [908.604196ms] [908.604196ms] END 2025-12-05T10:41:30.919903984Z I1205 10:41:30.919883 1 trace.go:236] Trace[1822372878]: "Get" accept:application/json,audit-id:838a58dc-aac5-4082-a76d-415191048301,client:192.168.32.10,api-group:cloudcredential.openshift.io,api-version:v1,name:openshift-powervs-cloud-controller-manager,subresource:,namespace:openshift-cloud-credential-operator,protocol:HTTP/2.0,resource:credentialsrequests,scope:resource,url:/apis/cloudcredential.openshift.io/v1/namespaces/openshift-cloud-credential-operator/credentialsrequests/openshift-powervs-cloud-controller-manager,user-agent:cluster-version-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:27.492) (total time: 3427ms): 2025-12-05T10:41:30.919903984Z Trace[1822372878]: [3.427718089s] [3.427718089s] END 2025-12-05T10:41:30.919952635Z I1205 10:41:30.919798 1 trace.go:236] Trace[1581191532]: "Get" accept:application/json, */*,audit-id:d5eadb75-516f-42e4-a334-15f688286037,client:10.128.0.19,api-group:apps,api-version:v1,name:csi-snapshot-controller,subresource:,namespace:openshift-cluster-storage-operator,protocol:HTTP/2.0,resource:deployments,scope:resource,url:/apis/apps/v1/namespaces/openshift-cluster-storage-operator/deployments/csi-snapshot-controller,user-agent:csi-snapshot-controller-operator/v0.0.0 (linux/amd64) kubernetes/$Format/csi-snapshot-controller,verb:GET (05-Dec-2025 10:41:29.703) (total time: 1216ms): 2025-12-05T10:41:30.919952635Z Trace[1581191532]: ---"About to write a response" 1216ms (10:41:30.919) 2025-12-05T10:41:30.919952635Z Trace[1581191532]: [1.216515454s] [1.216515454s] END 2025-12-05T10:41:30.920111399Z I1205 10:41:30.920069 1 trace.go:236] Trace[660456971]: "Get" accept:application/json, */*,audit-id:753c7273-897c-4283-b3f8-25336ddf7a4d,client:10.128.0.22,api-group:config.openshift.io,api-version:v1,name:marketplace,subresource:,namespace:,protocol:HTTP/2.0,resource:clusteroperators,scope:resource,url:/apis/config.openshift.io/v1/clusteroperators/marketplace,user-agent:marketplace-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:GET (05-Dec-2025 10:41:29.885) (total time: 1035ms): 2025-12-05T10:41:30.920111399Z Trace[660456971]: ---"About to write a response" 1034ms (10:41:30.919) 2025-12-05T10:41:30.920111399Z Trace[660456971]: [1.035020901s] [1.035020901s] END 2025-12-05T10:41:30.920684395Z I1205 10:41:30.920659 1 trace.go:236] Trace[1017181559]: "Update" accept:application/json, */*,audit-id:da17879b-28ed-497b-b55a-43b6b1ffdba6,client:10.128.0.64,api-group:machineconfiguration.openshift.io,api-version:v1,name:01-worker-container-runtime,subresource:,namespace:,protocol:HTTP/2.0,resource:machineconfigs,scope:resource,url:/apis/machineconfiguration.openshift.io/v1/machineconfigs/01-worker-container-runtime,user-agent:machine-config-controller/v0.0.0 (linux/amd64) kubernetes/$Format/template-controller,verb:PUT (05-Dec-2025 10:41:29.698) (total time: 1221ms): 2025-12-05T10:41:30.920684395Z Trace[1017181559]: ["GuaranteedUpdate etcd3" audit-id:da17879b-28ed-497b-b55a-43b6b1ffdba6,key:/machineconfiguration.openshift.io/machineconfigs/01-worker-container-runtime,type:*unstructured.Unstructured,resource:machineconfigs.machineconfiguration.openshift.io 1220ms (10:41:29.700)] 2025-12-05T10:41:30.920684395Z Trace[1017181559]: [1.221747248s] [1.221747248s] END 2025-12-05T10:41:30.921536526Z I1205 10:41:30.921501 1 trace.go:236] Trace[1124715069]: "GuaranteedUpdate etcd3" audit-id:,key:/masterleases/192.168.32.10,type:*v1.Endpoints,resource:apiServerIPInfo (05-Dec-2025 10:41:21.402) (total time: 9519ms): 2025-12-05T10:41:30.921536526Z Trace[1124715069]: ---"initial value restored" 9508ms (10:41:30.910) 2025-12-05T10:41:30.921536526Z Trace[1124715069]: [9.519449333s] [9.519449333s] END 2025-12-05T10:41:30.921901885Z I1205 10:41:30.921861 1 trace.go:236] Trace[798394683]: "Update" accept:application/json, */*,audit-id:f02d6a86-053e-425e-92f2-ff9dcff0ce7e,client:10.128.0.55,api-group:config.openshift.io,api-version:v1,name:cloud-credential,subresource:status,namespace:,protocol:HTTP/2.0,resource:clusteroperators,scope:resource,url:/apis/config.openshift.io/v1/clusteroperators/cloud-credential/status,user-agent:cloud-credential-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:PUT (05-Dec-2025 10:41:29.957) (total time: 963ms): 2025-12-05T10:41:30.921901885Z Trace[798394683]: ["GuaranteedUpdate etcd3" audit-id:f02d6a86-053e-425e-92f2-ff9dcff0ce7e,key:/config.openshift.io/clusteroperators/cloud-credential,type:*unstructured.Unstructured,resource:clusteroperators.config.openshift.io 962ms (10:41:29.959)] 2025-12-05T10:41:30.921901885Z Trace[798394683]: [963.967331ms] [963.967331ms] END 2025-12-05T10:41:30.929213924Z I1205 10:41:30.929177 1 trace.go:236] Trace[564209141]: "Get" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:03739d20-99de-40f8-a35b-0ee0cf5bbbac,client:10.128.0.59,api-group:,api-version:v1,name:etcd-master-0,subresource:log,namespace:openshift-etcd,protocol:HTTP/2.0,resource:pods,scope:resource,url:/api/v1/namespaces/openshift-etcd/pods/etcd-master-0/log,user-agent:insights-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:CONNECT (05-Dec-2025 10:41:15.911) (total time: 15017ms): 2025-12-05T10:41:30.929213924Z Trace[564209141]: ---"About to write a response" 15002ms (10:41:30.913) 2025-12-05T10:41:30.929213924Z Trace[564209141]: [15.017891402s] [15.017891402s] END 2025-12-05T10:41:30.931038421Z I1205 10:41:30.931011 1 trace.go:236] Trace[95040425]: "Update" accept:application/json, */*,audit-id:c512d6d8-d92e-4f69-8c92-7e38135dc17e,client:10.128.0.64,api-group:machineconfiguration.openshift.io,api-version:v1,name:rendered-worker-5237a1ca41d8ed74571ef4882dd5066c,subresource:,namespace:,protocol:HTTP/2.0,resource:machineconfigs,scope:resource,url:/apis/machineconfiguration.openshift.io/v1/machineconfigs/rendered-worker-5237a1ca41d8ed74571ef4882dd5066c,user-agent:machine-config-controller/v0.0.0 (linux/amd64) kubernetes/$Format/render-controller,verb:PUT (05-Dec-2025 10:41:19.515) (total time: 11415ms): 2025-12-05T10:41:30.931038421Z Trace[95040425]: ["GuaranteedUpdate etcd3" audit-id:c512d6d8-d92e-4f69-8c92-7e38135dc17e,key:/machineconfiguration.openshift.io/machineconfigs/rendered-worker-5237a1ca41d8ed74571ef4882dd5066c,type:*unstructured.Unstructured,resource:machineconfigs.machineconfiguration.openshift.io 11405ms (10:41:19.525)] 2025-12-05T10:41:30.931038421Z Trace[95040425]: [11.415312829s] [11.415312829s] END 2025-12-05T10:41:30.932354065Z I1205 10:41:30.932157 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2025-12-05T10:41:30.948776508Z I1205 10:41:30.948699 1 trace.go:236] Trace[717763534]: "Get" accept:application/json, */*,audit-id:116f78d4-d821-431e-b5e9-806b195cf4fd,client:10.128.0.64,api-group:machineconfiguration.openshift.io,api-version:v1,name:rendered-master-34d169a5708806bf3c34de6d844e803a,subresource:,namespace:,protocol:HTTP/2.0,resource:machineconfigs,scope:resource,url:/apis/machineconfiguration.openshift.io/v1/machineconfigs/rendered-master-34d169a5708806bf3c34de6d844e803a,user-agent:machine-config-controller/v0.0.0 (linux/amd64) kubernetes/$Format/render-controller,verb:GET (05-Dec-2025 10:41:19.828) (total time: 11120ms): 2025-12-05T10:41:30.948776508Z Trace[717763534]: ---"About to write a response" 11092ms (10:41:30.921) 2025-12-05T10:41:30.948776508Z Trace[717763534]: [11.120037168s] [11.120037168s] END 2025-12-05T10:41:30.954918506Z I1205 10:41:30.954853 1 trace.go:236] Trace[1269325561]: "List" accept:application/vnd.kubernetes.protobuf,application/json,audit-id:b91cb31b-3c92-4daf-8124-321acb3d4d32,client:10.128.0.25,api-group:,api-version:v1,name:,subresource:,namespace:openshift-kube-apiserver,protocol:HTTP/2.0,resource:pods,scope:namespace,url:/api/v1/namespaces/openshift-kube-apiserver/pods,user-agent:cluster-kube-controller-manager-operator/v0.0.0 (linux/amd64) kubernetes/$Format,verb:LIST (05-Dec-2025 10:41:29.752) (total time: 1202ms): 2025-12-05T10:41:30.954918506Z Trace[1269325561]: ["List(recursive=false) etcd3" audit-id:b91cb31b-3c92-4daf-8124-321acb3d4d32,key:/pods,resourceVersion:,resourceVersionMatch:,limit:1,continue: 1202ms (10:41:29.752)] 2025-12-05T10:41:30.954918506Z Trace[1269325561]: [1.202777s] [1.202777s] END 2025-12-05T10:41:30.967182272Z I1205 10:41:30.967110 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2025-12-05T10:41:30.983125972Z I1205 10:41:30.983080 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2025-12-05T10:41:30.994991718Z I1205 10:41:30.994679 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2025-12-05T10:41:31.003971769Z I1205 10:41:31.003917 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2025-12-05T10:41:31.011697528Z I1205 10:41:31.011635 1 trace.go:236] Trace[966095824]: "List" accept:application/json, */*,audit-id:b1cb06a3-4410-4a57-a54c-057c5507f30c,client:10.128.0.64,api-group:machineconfiguration.openshift.io,api-version:v1,name:,subresource:,namespace:,protocol:HTTP/2.0,resource:machineosconfigs,scope:cluster,url:/apis/machineconfiguration.openshift.io/v1/machineosconfigs,user-agent:machine-config-controller/v0.0.0 (linux/amd64) kubernetes/$Format/node-update-controller,verb:LIST (05-Dec-2025 10:41:28.500) (total time: 2511ms): 2025-12-05T10:41:31.011697528Z Trace[966095824]: ["List(recursive=false) etcd3" audit-id:b1cb06a3-4410-4a57-a54c-057c5507f30c,key:/machineconfiguration.openshift.io/machineosconfigs,resourceVersion:,resourceVersionMatch:,limit:1,continue: 2511ms (10:41:28.500)] 2025-12-05T10:41:31.011697528Z Trace[966095824]: [2.511445246s] [2.511445246s] END 2025-12-05T10:41:31.029155287Z I1205 10:41:31.029087 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2025-12-05T10:41:31.048719181Z I1205 10:41:31.048664 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2025-12-05T10:41:31.058462462Z I1205 10:41:31.058129 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2025-12-05T10:41:31.058462462Z I1205 10:41:31.058348 1 controller.go:615] quota admission added evaluator for: machinehealthchecks.machine.openshift.io 2025-12-05T10:41:31.058462462Z I1205 10:41:31.058440 1 controller.go:615] quota admission added evaluator for: machinehealthchecks.machine.openshift.io config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015114533341031143 0ustar00000000000000002025-12-05T10:35:29.213780435Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115114533341037010 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-765d9ff747-p57fl2025-12-05T10:40:27.486560047Z I1205 10:40:27.486384 1 cmd.go:253] Using service-serving-cert provided certificates 2025-12-05T10:40:27.486560047Z I1205 10:40:27.486526 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-05T10:40:27.488281332Z I1205 10:40:27.488244 1 observer_polling.go:159] Starting file observer 2025-12-05T10:40:27.511937061Z I1205 10:40:27.511851 1 builder.go:304] kube-apiserver-operator version 4.18.0-202511181540.p2.gbac8a7c.assembly.stream.el9-bac8a7c-bac8a7c99c2e8562a05b784c8fe4f8ecd91eecdf 2025-12-05T10:40:28.806470914Z I1205 10:40:28.806364 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-05T10:40:28.806470914Z W1205 10:40:28.806395 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:40:28.806470914Z W1205 10:40:28.806402 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:40:28.806470914Z W1205 10:40:28.806408 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-05T10:40:28.806470914Z W1205 10:40:28.806411 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-05T10:40:28.806470914Z W1205 10:40:28.806414 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-05T10:40:28.806470914Z W1205 10:40:28.806437 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-05T10:40:28.839479523Z I1205 10:40:28.836580 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-05T10:40:28.839479523Z I1205 10:40:28.836634 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-05T10:40:28.839479523Z I1205 10:40:28.836660 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-05T10:40:28.839479523Z I1205 10:40:28.836690 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-05T10:40:28.839479523Z I1205 10:40:28.836823 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-05T10:40:28.839479523Z I1205 10:40:28.836982 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:40:28.839479523Z I1205 10:40:28.837019 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:40:28.839479523Z I1205 10:40:28.837280 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:40:28.839479523Z I1205 10:40:28.837293 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:40:28.860875805Z I1205 10:40:28.858375 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-05T10:40:28.864459216Z I1205 10:40:28.861282 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2025-12-05T10:40:28.936865581Z I1205 10:40:28.936796 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-05T10:40:28.938012741Z I1205 10:40:28.937946 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:40:28.938012741Z I1205 10:40:28.937959 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000004366315114533341037220 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-765d9ff747-p57fl2025-12-05T10:39:03.976758532Z I1205 10:39:03.975869 1 base_controller.go:123] Shutting down worker of kube-apiserver-Node controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975883 1 base_controller.go:113] All kube-apiserver-Node workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975884 1 base_controller.go:123] Shutting down worker of kube-apiserver-RemoveStaleConditions controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975833 1 base_controller.go:113] All GuardController workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975899 1 base_controller.go:113] All kube-apiserver-RemoveStaleConditions workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975895 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975916 1 base_controller.go:123] Shutting down worker of SCCReconcileController controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975875 1 base_controller.go:113] All ServiceAccountIssuerController workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975697 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975948 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionMigration controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975949 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975959 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975884 1 controller_manager.go:54] kube-apiserver-StaticPodStateFallback controller terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975953 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionPrune controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975978 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975980 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975993 1 base_controller.go:113] All CertRotationController workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976005 1 base_controller.go:113] All RevisionController workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975863 1 base_controller.go:123] Shutting down worker of KubeletVersionSkewController controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976017 1 controller_manager.go:54] RevisionController controller terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975983 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionPrune workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976041 1 base_controller.go:113] All KubeletVersionSkewController workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975734 1 builder.go:335] server exited 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975743 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionState controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976073 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionState workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975899 1 base_controller.go:181] Shutting down openshift-kube-apiserver-EncryptionCondition ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975820 1 base_controller.go:113] All CertRotationTimeUpgradeableController workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975848 1 base_controller.go:113] All PodSecurityReadinessController workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975740 1 certrotationcontroller.go:828] Shutting down CertRotation 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975743 1 base_controller.go:113] All StatusSyncer_kube-apiserver workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975718 1 base_controller.go:181] Shutting down LoggingSyncer ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976133 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976144 1 controller_manager.go:54] LoggingSyncer controller terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975521 1 base_controller.go:181] Shutting down kube-apiserver-StartupMonitorPodCondition ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976162 1 base_controller.go:113] All kube-apiserver-StartupMonitorPodCondition workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976172 1 controller_manager.go:54] kube-apiserver-StartupMonitorPodCondition controller terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975767 1 base_controller.go:113] All ConfigObserver workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975769 1 base_controller.go:123] Shutting down worker of cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976197 1 base_controller.go:113] All cluster-kube-apiserver-operator-UnsupportedConfigOverrides workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976208 1 controller_manager.go:54] cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975778 1 base_controller.go:113] All PruneController workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976224 1 controller_manager.go:54] PruneController controller terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975779 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2025-12-05T10:39:03.976758532Z I1205 10:39:03.976247 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2025-12-05T10:39:03.976758532Z I1205 10:39:03.975791 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976264 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976278 1 controller_manager.go:54] MissingStaticPodController controller terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975512 1 base_controller.go:181] Shutting down Installer ... 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975792 1 base_controller.go:181] Shutting down webhookSupportabilityController ... 2025-12-05T10:39:03.976881495Z E1205 10:39:03.975838 1 base_controller.go:279] "Unhandled Error" err="webhookSupportabilityController reconciliation failed: Put \"https://172.30.0.1:443/apis/operator.openshift.io/v1/kubeapiservers/cluster/status\": context canceled" 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975895 1 controller_manager.go:54] kube-apiserver-Node controller terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975906 1 controller_manager.go:54] GuardController controller terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975911 1 base_controller.go:181] Shutting down openshift-kube-apiserver-EncryptionMigration ... 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976328 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionMigration workers have been terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975920 1 base_controller.go:181] Shutting down BoundSATokenSignerController ... 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976344 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975929 1 base_controller.go:113] All SCCReconcileController workers have been terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975922 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976373 1 base_controller.go:113] All CertRotationController workers have been terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975678 1 base_controller.go:181] Shutting down CertRotationController ... 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976391 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976399 1 base_controller.go:113] All CertRotationController workers have been terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975941 1 base_controller.go:123] Shutting down worker of openshift-kube-apiserver-EncryptionCondition controller ... 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976417 1 base_controller.go:113] All openshift-kube-apiserver-EncryptionCondition workers have been terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975366 1 base_controller.go:181] Shutting down TargetConfigController ... 2025-12-05T10:39:03.976881495Z I1205 10:39:03.975959 1 base_controller.go:113] All CertRotationController workers have been terminated 2025-12-05T10:39:03.976881495Z E1205 10:39:03.976583 1 base_controller.go:279] "Unhandled Error" err="kube-apiserver-StaticPodState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-StaticPodState\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976609 1 base_controller.go:123] Shutting down worker of kube-apiserver-InstallerState controller ... 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976621 1 base_controller.go:113] All kube-apiserver-InstallerState workers have been terminated 2025-12-05T10:39:03.976881495Z I1205 10:39:03.976628 1 controller_manager.go:54] kube-apiserver-InstallerState controller terminated 2025-12-05T10:39:03.977395929Z E1205 10:39:03.977337 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2025-12-05T10:39:03.977462581Z I1205 10:39:03.977410 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2025-12-05T10:39:03.977496011Z I1205 10:39:03.977456 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2025-12-05T10:39:03.977968693Z I1205 10:39:03.977883 1 base_controller.go:123] Shutting down worker of kube-apiserver-StaticPodState controller ... 2025-12-05T10:39:03.977968693Z I1205 10:39:03.977906 1 base_controller.go:113] All kube-apiserver-StaticPodState workers have been terminated 2025-12-05T10:39:03.977968693Z I1205 10:39:03.977915 1 controller_manager.go:54] kube-apiserver-StaticPodState controller terminated 2025-12-05T10:39:03.978548169Z E1205 10:39:03.978470 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:39:03.978548169Z I1205 10:39:03.978520 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2025-12-05T10:39:03.978548169Z I1205 10:39:03.978529 1 base_controller.go:113] All TargetConfigController workers have been terminated 2025-12-05T10:39:03.979210946Z E1205 10:39:03.979156 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:39:03.980057648Z W1205 10:39:03.979987 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2025-12-05T10:39:03.980057648Z W1205 10:39:03.980024 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2025-12-05T10:39:03.980057648Z W1205 10:39:03.980037 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2025-12-05T10:39:03.980292144Z E1205 10:39:03.980229 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-Installer\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:39:03.980347446Z I1205 10:39:03.980296 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2025-12-05T10:39:03.980347446Z I1205 10:39:03.980315 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2025-12-05T10:39:03.980347446Z I1205 10:39:03.980328 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2025-12-05T10:39:03.980347446Z I1205 10:39:03.980340 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2025-12-05T10:39:03.980372467Z I1205 10:39:03.980353 1 base_controller.go:113] All auditPolicyController workers have been terminated 2025-12-05T10:39:03.981565998Z I1205 10:39:03.981508 1 base_controller.go:123] Shutting down worker of Installer controller ... 2025-12-05T10:39:03.981565998Z I1205 10:39:03.981544 1 base_controller.go:113] All Installer workers have been terminated 2025-12-05T10:39:03.981597969Z I1205 10:39:03.981566 1 controller_manager.go:54] Installer controller terminated 2025-12-05T10:39:03.983890508Z E1205 10:39:03.983839 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/localhost-recovery-client\": context canceled, \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:39:03.985192262Z I1205 10:39:03.985109 1 base_controller.go:123] Shutting down worker of KubeAPIServerStaticResources-StaticResources controller ... 2025-12-05T10:39:03.985192262Z I1205 10:39:03.985164 1 base_controller.go:113] All KubeAPIServerStaticResources-StaticResources workers have been terminated 2025-12-05T10:39:06.371378004Z E1205 10:39:06.371292 1 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{kube-apiserver-operator.187e4b71343430f9 openshift-kube-apiserver-operator 8635 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-kube-apiserver-operator,Name:kube-apiserver-operator,UID:5a9e9460-0191-4b35-b256-a46bb0b6d191,APIVersion:apps/v1,ResourceVersion:,FieldPath:,},Reason:ConfigMissing,Message:no observedConfig,Source:EventSource{Component:kube-apiserver-operator-target-config-controller-targetconfigcontroller,Host:,},FirstTimestamp:2025-12-05 10:37:33 +0000 UTC,LastTimestamp:2025-12-05 10:37:49.227593038 +0000 UTC m=+20.997405381,Count:81,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kube-apiserver-operator-target-config-controller-targetconfigcontroller,ReportingInstance:,}" 2025-12-05T10:39:08.973907862Z I1205 10:39:08.973797 1 observer_polling.go:162] Shutting down file observer 2025-12-05T10:39:37.977577481Z E1205 10:39:37.977501 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2025-12-05T10:39:37.977577481Z W1205 10:39:37.977545 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-765d9ff747-p57fl.json0000640000000000000000000001363015114533341030001 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-765d9ff747-p57fl","generateName":"kube-apiserver-operator-765d9ff747-","namespace":"openshift-kube-apiserver-operator","uid":"444f8808-e454-4015-9e20-429e715a08c7","resourceVersion":"8786","creationTimestamp":"2025-12-05T10:35:55Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"765d9ff747"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.14/23\"],\"mac_address\":\"0a:58:0a:80:00:0e\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.14/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.14\"\n ],\n \"mac\": \"0a:58:0a:80:00:0e\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-765d9ff747","uid":"bc55a56c-31b7-42d3-bfd6-7a663f8f3352","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.13"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.29"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.14","podIPs":[{"ip":"10.128.0.14"}],"startTime":"2025-12-05T10:37:08Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2025-12-05T10:40:27Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-05T10:37:28Z","finishedAt":"2025-12-05T10:39:38Z","containerID":"cri-o://a4e599b9d9dac0eea61bdc89656e6a7ee18f83aa3fd9ba9340f57da02bd4a39b"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","containerID":"cri-o://081be958f469d91b44369f7b9a2fd1d6880cb567d726cc740245fe45c1fec94e","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007420215114533341025177 0ustar00000000000000002025-12-05T10:38:32.194383712Z 2025-12-05T10:38:32.194383712Z cluster-etcd-operator rev \ 2025-12-05T10:38:32.194383712Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2025-12-05T10:38:32.194383712Z --client-cert-file=$(ETCDCTL_CERT) \ 2025-12-05T10:38:32.194383712Z --client-key-file=$(ETCDCTL_KEY) \ 2025-12-05T10:38:32.194383712Z --client-cacert-file=$(ETCDCTL_CACERT) 2025-12-05T10:38:32.194383712Z securityContext: 2025-12-05T10:38:32.194383712Z privileged: true 2025-12-05T10:38:32.194383712Z resources: 2025-12-05T10:38:32.194383712Z requests: 2025-12-05T10:38:32.194383712Z memory: 50Mi 2025-12-05T10:38:32.194383712Z cpu: 10m 2025-12-05T10:38:32.194383712Z env: 2025-12-05T10:38:32.194383712Z - name: "ALL_ETCD_ENDPOINTS" 2025-12-05T10:38:32.194383712Z value: "https://192.168.32.10:2379" 2025-12-05T10:38:32.194383712Z - name: "ETCDCTL_API" 2025-12-05T10:38:32.194383712Z value: "3" 2025-12-05T10:38:32.194383712Z - name: "ETCDCTL_CACERT" 2025-12-05T10:38:32.194383712Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2025-12-05T10:38:32.194383712Z - name: "ETCDCTL_CERT" 2025-12-05T10:38:32.194383712Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2025-12-05T10:38:32.194383712Z - name: "ETCDCTL_ENDPOINTS" 2025-12-05T10:38:32.194383712Z value: "https://192.168.32.10:2379" 2025-12-05T10:38:32.194383712Z - name: "ETCDCTL_KEY" 2025-12-05T10:38:32.194383712Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2025-12-05T10:38:32.194383712Z - name: "ETCD_CIPHER_SUITES" 2025-12-05T10:38:32.194383712Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2025-12-05T10:38:32.194383712Z - name: "ETCD_DATA_DIR" 2025-12-05T10:38:32.194383712Z value: "/var/lib/etcd" 2025-12-05T10:38:32.194383712Z - name: "ETCD_ELECTION_TIMEOUT" 2025-12-05T10:38:32.194383712Z value: "2500" 2025-12-05T10:38:32.194383712Z - name: "ETCD_ENABLE_PPROF" 2025-12-05T10:38:32.194383712Z value: "true" 2025-12-05T10:38:32.194383712Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2025-12-05T10:38:32.194383712Z value: "1" 2025-12-05T10:38:32.194383712Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2025-12-05T10:38:32.194516565Z value: "200ms" 2025-12-05T10:38:32.194516565Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2025-12-05T10:38:32.194516565Z value: "5s" 2025-12-05T10:38:32.194516565Z - name: "ETCD_HEARTBEAT_INTERVAL" 2025-12-05T10:38:32.194516565Z value: "500" 2025-12-05T10:38:32.194516565Z - name: "ETCD_IMAGE" 2025-12-05T10:38:32.194516565Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718" 2025-12-05T10:38:32.194516565Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2025-12-05T10:38:32.194516565Z value: "existing" 2025-12-05T10:38:32.194516565Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2025-12-05T10:38:32.194516565Z value: "8589934592" 2025-12-05T10:38:32.194516565Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2025-12-05T10:38:32.194516565Z value: "true" 2025-12-05T10:38:32.194516565Z - name: "ETCD_TLS_MIN_VERSION" 2025-12-05T10:38:32.194516565Z value: "TLS1.2" 2025-12-05T10:38:32.194516565Z - name: "NODE_master_0_ETCD_NAME" 2025-12-05T10:38:32.194516565Z value: "master-0" 2025-12-05T10:38:32.194516565Z - name: "NODE_master_0_ETCD_URL_HOST" 2025-12-05T10:38:32.194516565Z value: "192.168.32.10" 2025-12-05T10:38:32.194516565Z - name: "NODE_master_0_IP" 2025-12-05T10:38:32.194516565Z value: "192.168.32.10" 2025-12-05T10:38:32.194516565Z volumeMounts: 2025-12-05T10:38:32.194516565Z - mountPath: /var/lib/etcd 2025-12-05T10:38:32.194516565Z name: data-dir 2025-12-05T10:38:32.194516565Z - mountPath: /etc/kubernetes/static-pod-certs 2025-12-05T10:38:32.194516565Z name: cert-dir 2025-12-05T10:38:32.194516565Z hostNetwork: true 2025-12-05T10:38:32.194516565Z priorityClassName: system-node-critical 2025-12-05T10:38:32.194516565Z tolerations: 2025-12-05T10:38:32.194516565Z - operator: "Exists" 2025-12-05T10:38:32.194516565Z volumes: 2025-12-05T10:38:32.194516565Z - hostPath: 2025-12-05T10:38:32.194516565Z path: /etc/kubernetes/manifests 2025-12-05T10:38:32.194516565Z name: static-pod-dir 2025-12-05T10:38:32.194516565Z - hostPath: 2025-12-05T10:38:32.194516565Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2025-12-05T10:38:32.194516565Z name: resource-dir 2025-12-05T10:38:32.194516565Z - hostPath: 2025-12-05T10:38:32.194516565Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2025-12-05T10:38:32.194516565Z name: cert-dir 2025-12-05T10:38:32.194516565Z - hostPath: 2025-12-05T10:38:32.194516565Z path: /var/lib/etcd 2025-12-05T10:38:32.194516565Z type: "" 2025-12-05T10:38:32.194516565Z name: data-dir 2025-12-05T10:38:32.194516565Z - hostPath: 2025-12-05T10:38:32.194516565Z path: /usr/local/bin 2025-12-05T10:38:32.194516565Z name: usr-local-bin 2025-12-05T10:38:32.194516565Z - hostPath: 2025-12-05T10:38:32.194516565Z path: /var/log/etcd 2025-12-05T10:38:32.194516565Z name: log-dir 2025-12-05T10:38:32.194516565Z - hostPath: 2025-12-05T10:38:32.194516565Z path: /etc/kubernetes 2025-12-05T10:38:32.194516565Z name: config-dir 2025-12-05T10:38:32.194516565Z - hostPath: 2025-12-05T10:38:32.194516565Z path: /var/lib/etcd-auto-backup 2025-12-05T10:38:32.194516565Z name: etcd-auto-backup-dir 2025-12-05T10:38:32.203217241Z I1205 10:38:32.203166 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2025-12-05T10:38:32.203443337Z I1205 10:38:32.203407 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2025-12-05T10:38:32.203462418Z I1205 10:38:32.203436 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2025-12-05T10:38:32.203462418Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical"},"status":{}} 2025-12-05T10:38:46.392561555Z W1205 10:38:46.392303 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.187e4b7edbed86d6.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:e149cbe7-1ec3-4a06-af61-3a8906b8e9ef,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2025-12-05 10:38:32.20355247 +0000 UTC m=+30.833606887,LastTimestamp:2025-12-05 10:38:32.20355247 +0000 UTC m=+30.833606887,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: the server was unable to return a response in the time allotted, but may still be processing the request (post events) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000001615215114533341023477 0ustar00000000000000002025-12-05T10:39:40.148038509Z I1205 10:39:40.147708 1 etcdcli_pool.go:70] creating a new cached client 2025-12-05T10:39:40.150467023Z 2025/12/05 10:39:40 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:40.150747620Z 2025/12/05 10:39:40 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:41.151494155Z 2025/12/05 10:39:41 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:41.151494155Z 2025/12/05 10:39:41 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:42.870909657Z 2025/12/05 10:39:42 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:42.937520407Z 2025/12/05 10:39:42 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:45.188954619Z 2025/12/05 10:39:45 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:45.309739678Z 2025/12/05 10:39:45 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:48.981069031Z 2025/12/05 10:39:48 WARNING: [core] [Channel #3 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:49.832236287Z 2025/12/05 10:39:49 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:50.147853583Z {"level":"warn","ts":"2025-12-05T10:39:50.147713Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc000a2c000/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2025-12-05T10:39:50.148093769Z E1205 10:39:50.148062 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2025-12-05T10:39:50.148198773Z E1205 10:39:50.148179 1 rev.go:176] could not reach any endpoint to get the raft index 2025-12-05T10:39:50.150225075Z 2025/12/05 10:39:50 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:51.150904771Z 2025/12/05 10:39:51 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:52.573009428Z 2025/12/05 10:39:52 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:54.941013882Z 2025/12/05 10:39:54 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:56.143639048Z 2025/12/05 10:39:56 WARNING: [core] [Channel #1 SubChannel #2]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:58.340279837Z 2025/12/05 10:39:58 WARNING: [core] [Channel #5 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:40:00.149653047Z {"level":"warn","ts":"2025-12-05T10:40:00.149388Z","logger":"etcd-client","caller":"v3@v3.5.14/retry_interceptor.go:63","msg":"retrying of unary invoker failed","target":"etcd-endpoints://0xc000a2c000/192.168.32.10:2379","attempt":0,"error":"rpc error: code = DeadlineExceeded desc = latest balancer error: last connection error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused\""} 2025-12-05T10:40:00.149653047Z E1205 10:40:00.149595 1 rev.go:160] error getting status from [https://192.168.32.10:2379]: context deadline exceeded 2025-12-05T10:40:00.149653047Z E1205 10:40:00.149619 1 rev.go:176] could not reach any endpoint to get the raft index 2025-12-05T10:40:00.150800487Z 2025/12/05 10:40:00 WARNING: [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215114533341024171 0ustar00000000000000002025-12-05T10:39:29.895347679Z I1205 10:39:29.895086 1 readyz.go:175] Listening on 0.0.0.0:9980 2025-12-05T10:40:35.288275602Z I1205 10:40:35.288175 1 etcdcli_pool.go:70] creating a new cached client 2025-12-05T10:40:40.284620582Z I1205 10:40:40.284530 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000005771615114533341024364 0ustar00000000000000002025-12-05T10:39:29.597219972Z {"level":"info","ts":"2025-12-05T10:39:29.596936Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2025-12-05T10:39:29.599300036Z {"level":"info","ts":"2025-12-05T10:39:29.599070Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2025-12-05T10:39:29.600148108Z {"level":"info","ts":"2025-12-05T10:39:29.600072Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2025-12-05T10:39:29.600360763Z {"level":"info","ts":"2025-12-05T10:39:29.600259Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2025-12-05T10:39:29.600402855Z {"level":"info","ts":"2025-12-05T10:39:29.600370Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc0000fe000/192.168.32.10:9978\""} 2025-12-05T10:39:29.600525518Z {"level":"info","ts":"2025-12-05T10:39:29.600466Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc0000fe000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2025-12-05T10:39:29.600566539Z {"level":"info","ts":"2025-12-05T10:39:29.600516Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2025-12-05T10:39:29.601131664Z {"level":"info","ts":"2025-12-05T10:39:29.601040Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2025-12-05T10:39:29.601245097Z {"level":"info","ts":"2025-12-05T10:39:29.601144Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2025-12-05T10:39:29.601359170Z {"level":"info","ts":"2025-12-05T10:39:29.601303Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc000420640 } }"} 2025-12-05T10:39:29.601407291Z {"level":"info","ts":"2025-12-05T10:39:29.601367Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2025-12-05T10:39:29.601507764Z {"level":"info","ts":"2025-12-05T10:39:29.601467Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2025-12-05T10:39:29.601541635Z {"level":"info","ts":"2025-12-05T10:39:29.601502Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2025-12-05T10:39:29.601638647Z {"level":"info","ts":"2025-12-05T10:39:29.601564Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-05T10:39:29.601675658Z {"level":"info","ts":"2025-12-05T10:39:29.601627Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-05T10:39:29.601918574Z {"level":"info","ts":"2025-12-05T10:39:29.601781Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, CONNECTING"} 2025-12-05T10:39:29.602219562Z {"level":"info","ts":"2025-12-05T10:39:29.602160Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:29.602310384Z {"level":"warn","ts":"2025-12-05T10:39:29.602213Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:29.602377526Z {"level":"info","ts":"2025-12-05T10:39:29.602319Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:29.602508790Z {"level":"info","ts":"2025-12-05T10:39:29.602400Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, TRANSIENT_FAILURE"} 2025-12-05T10:39:29.602552791Z {"level":"info","ts":"2025-12-05T10:39:29.602524Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2025-12-05T10:39:29.603638239Z {"level":"info","ts":"2025-12-05T10:39:29.603576Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2025-12-05T10:39:29.603734441Z {"level":"info","ts":"2025-12-05T10:39:29.603689Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2025-12-05T10:39:29.604449621Z {"level":"info","ts":"2025-12-05T10:39:29.604370Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2025-12-05T10:39:29.604449621Z {"level":"info","ts":"2025-12-05T10:39:29.604405Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2025-12-05T10:39:29.604504902Z {"level":"info","ts":"2025-12-05T10:39:29.604463Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2025-12-05T10:39:29.604538273Z {"level":"info","ts":"2025-12-05T10:39:29.604504Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2025-12-05T10:39:29.604854951Z {"level":"info","ts":"2025-12-05T10:39:29.604772Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2025-12-05T10:39:30.602823843Z {"level":"info","ts":"2025-12-05T10:39:30.602636Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:30.602823843Z {"level":"info","ts":"2025-12-05T10:39:30.602764Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, IDLE"} 2025-12-05T10:39:30.602923376Z {"level":"info","ts":"2025-12-05T10:39:30.602819Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-05T10:39:30.602923376Z {"level":"info","ts":"2025-12-05T10:39:30.602874Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-05T10:39:30.603334796Z {"level":"info","ts":"2025-12-05T10:39:30.603121Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, CONNECTING"} 2025-12-05T10:39:30.603696836Z {"level":"info","ts":"2025-12-05T10:39:30.603559Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:30.603696836Z {"level":"warn","ts":"2025-12-05T10:39:30.603649Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:30.603742447Z {"level":"info","ts":"2025-12-05T10:39:30.603710Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:30.603832440Z {"level":"info","ts":"2025-12-05T10:39:30.603756Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, TRANSIENT_FAILURE"} 2025-12-05T10:39:32.493106624Z {"level":"info","ts":"2025-12-05T10:39:32.492658Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:32.493106624Z {"level":"info","ts":"2025-12-05T10:39:32.492746Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, IDLE"} 2025-12-05T10:39:32.493106624Z {"level":"info","ts":"2025-12-05T10:39:32.492794Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-05T10:39:32.493106624Z {"level":"info","ts":"2025-12-05T10:39:32.492823Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-05T10:39:32.493106624Z {"level":"info","ts":"2025-12-05T10:39:32.493004Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, CONNECTING"} 2025-12-05T10:39:32.493533255Z {"level":"info","ts":"2025-12-05T10:39:32.493322Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:32.493533255Z {"level":"warn","ts":"2025-12-05T10:39:32.493356Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:32.493533255Z {"level":"info","ts":"2025-12-05T10:39:32.493406Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:32.493533255Z {"level":"info","ts":"2025-12-05T10:39:32.493445Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, TRANSIENT_FAILURE"} 2025-12-05T10:39:35.049331033Z {"level":"info","ts":"2025-12-05T10:39:35.049187Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:35.049331033Z {"level":"info","ts":"2025-12-05T10:39:35.049264Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, IDLE"} 2025-12-05T10:39:35.049331033Z {"level":"info","ts":"2025-12-05T10:39:35.049304Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-05T10:39:35.049454506Z {"level":"info","ts":"2025-12-05T10:39:35.049328Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-05T10:39:35.049486567Z {"level":"info","ts":"2025-12-05T10:39:35.049457Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, CONNECTING"} 2025-12-05T10:39:35.049941648Z {"level":"info","ts":"2025-12-05T10:39:35.049855Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:35.049995069Z {"level":"warn","ts":"2025-12-05T10:39:35.049944Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:35.050064021Z {"level":"info","ts":"2025-12-05T10:39:35.050016Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:35.050130703Z {"level":"info","ts":"2025-12-05T10:39:35.050089Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, TRANSIENT_FAILURE"} 2025-12-05T10:39:38.441020532Z {"level":"info","ts":"2025-12-05T10:39:38.440858Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:38.441020532Z {"level":"info","ts":"2025-12-05T10:39:38.440977Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, IDLE"} 2025-12-05T10:39:38.441133505Z {"level":"info","ts":"2025-12-05T10:39:38.441024Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-05T10:39:38.441133505Z {"level":"info","ts":"2025-12-05T10:39:38.441089Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-05T10:39:38.441318750Z {"level":"info","ts":"2025-12-05T10:39:38.441227Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, CONNECTING"} 2025-12-05T10:39:38.441905306Z {"level":"info","ts":"2025-12-05T10:39:38.441793Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:38.441905306Z {"level":"warn","ts":"2025-12-05T10:39:38.441873Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:38.441943907Z {"level":"info","ts":"2025-12-05T10:39:38.441924Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:38.442030279Z {"level":"info","ts":"2025-12-05T10:39:38.441971Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, TRANSIENT_FAILURE"} 2025-12-05T10:39:44.405225858Z {"level":"info","ts":"2025-12-05T10:39:44.405079Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:44.405225858Z {"level":"info","ts":"2025-12-05T10:39:44.405174Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, IDLE"} 2025-12-05T10:39:44.405290350Z {"level":"info","ts":"2025-12-05T10:39:44.405221Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-05T10:39:44.405290350Z {"level":"info","ts":"2025-12-05T10:39:44.405272Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-05T10:39:44.405568657Z {"level":"info","ts":"2025-12-05T10:39:44.405459Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, CONNECTING"} 2025-12-05T10:39:44.405911796Z {"level":"info","ts":"2025-12-05T10:39:44.405817Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:44.405973697Z {"level":"warn","ts":"2025-12-05T10:39:44.405917Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:44.406095870Z {"level":"info","ts":"2025-12-05T10:39:44.405988Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:44.406095870Z {"level":"info","ts":"2025-12-05T10:39:44.406062Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, TRANSIENT_FAILURE"} 2025-12-05T10:39:53.213589803Z {"level":"info","ts":"2025-12-05T10:39:53.213372Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:53.213589803Z {"level":"info","ts":"2025-12-05T10:39:53.213512Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, IDLE"} 2025-12-05T10:39:53.213662224Z {"level":"info","ts":"2025-12-05T10:39:53.213585Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-05T10:39:53.213662224Z {"level":"info","ts":"2025-12-05T10:39:53.213641Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-05T10:39:53.213849999Z {"level":"info","ts":"2025-12-05T10:39:53.213760Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, CONNECTING"} 2025-12-05T10:39:53.214163887Z {"level":"info","ts":"2025-12-05T10:39:53.214101Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:53.214177927Z {"level":"warn","ts":"2025-12-05T10:39:53.214152Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:53.214219998Z {"level":"info","ts":"2025-12-05T10:39:53.214188Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:39:53.214269610Z {"level":"info","ts":"2025-12-05T10:39:53.214235Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, TRANSIENT_FAILURE"} 2025-12-05T10:40:12.485310525Z {"level":"info","ts":"2025-12-05T10:40:12.485201Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2025-12-05T10:40:12.485310525Z {"level":"info","ts":"2025-12-05T10:40:12.485263Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, IDLE"} 2025-12-05T10:40:12.485371476Z {"level":"info","ts":"2025-12-05T10:40:12.485291Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2025-12-05T10:40:12.485371476Z {"level":"info","ts":"2025-12-05T10:40:12.485319Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2025-12-05T10:40:12.485543570Z {"level":"info","ts":"2025-12-05T10:40:12.485477Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, CONNECTING"} 2025-12-05T10:40:12.491513114Z {"level":"info","ts":"2025-12-05T10:40:12.491439Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2025-12-05T10:40:12.491570295Z {"level":"info","ts":"2025-12-05T10:40:12.491500Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00038f770, READY"} 2025-12-05T10:40:12.491628187Z {"level":"info","ts":"2025-12-05T10:40:12.491588Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2025-12-05T10:40:12.491636248Z {"level":"info","ts":"2025-12-05T10:40:12.491622Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000013146515114533341022712 0ustar00000000000000002025-12-05T10:41:30.912410692Z {"level":"info","ts":"2025-12-05T10:41:30.909700Z","caller":"traceutil/trace.go:171","msg":"trace[1240758388] range","detail":"{range_begin:/kubernetes.io/pods/openshift-kube-controller-manager/kube-controller-manager-master-0; range_end:; response_count:1; response_revision:10004; }","duration":"8.839149917s","start":"2025-12-05T10:41:22.070540Z","end":"2025-12-05T10:41:30.909690Z","steps":["trace[1240758388] 'agreement among raft nodes before linearized reading' (duration: 8.839074316s)"],"step_count":1} 2025-12-05T10:41:30.912410692Z {"level":"warn","ts":"2025-12-05T10:41:30.909730Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:22.070522Z","time spent":"8.839199158s","remote":"[::1]:37048","response type":"/etcdserverpb.KV/Range","request count":0,"request size":88,"response count":1,"response size":16026,"request content":"key:\"/kubernetes.io/pods/openshift-kube-controller-manager/kube-controller-manager-master-0\" "} 2025-12-05T10:41:30.912410692Z {"level":"warn","ts":"2025-12-05T10:41:30.909759Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"4.499046786s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/leases/kube-system/kube-scheduler\" ","response":"range_response_count:1 size:484"} 2025-12-05T10:41:30.912410692Z {"level":"info","ts":"2025-12-05T10:41:30.909850Z","caller":"traceutil/trace.go:171","msg":"trace[1443719732] range","detail":"{range_begin:/kubernetes.io/leases/kube-system/kube-scheduler; range_end:; response_count:1; response_revision:10004; }","duration":"4.499164728s","start":"2025-12-05T10:41:26.410670Z","end":"2025-12-05T10:41:30.909835Z","steps":["trace[1443719732] 'agreement among raft nodes before linearized reading' (duration: 4.499009844s)"],"step_count":1} 2025-12-05T10:41:30.912410692Z {"level":"warn","ts":"2025-12-05T10:41:30.908945Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.885312Z","time spent":"1.023576455s","remote":"[::1]:37208","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":645,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2025-12-05T10:41:30.912410692Z {"level":"warn","ts":"2025-12-05T10:41:30.909897Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"11.408427192s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/cluster-autoscaler\" ","response":"range_response_count:1 size:2554"} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.909902Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:26.410653Z","time spent":"4.49923687s","remote":"[::1]:37208","response type":"/etcdserverpb.KV/Range","request count":0,"request size":50,"response count":1,"response size":508,"request content":"key:\"/kubernetes.io/leases/kube-system/kube-scheduler\" "} 2025-12-05T10:41:30.912505594Z {"level":"info","ts":"2025-12-05T10:41:30.909574Z","caller":"traceutil/trace.go:171","msg":"trace[1667919957] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/machineconfigs/rendered-worker-5237a1ca41d8ed74571ef4882dd5066c; range_end:; response_count:1; response_revision:10004; }","duration":"11.379800295s","start":"2025-12-05T10:41:19.529768Z","end":"2025-12-05T10:41:30.909568Z","steps":["trace[1667919957] 'agreement among raft nodes before linearized reading' (duration: 11.379726364s)"],"step_count":1} 2025-12-05T10:41:30.912505594Z {"level":"info","ts":"2025-12-05T10:41:30.909233Z","caller":"traceutil/trace.go:171","msg":"trace[1581928459] range","detail":"{range_begin:/kubernetes.io/clusterroles/; range_end:/kubernetes.io/clusterroles0; response_count:0; response_revision:10004; }","duration":"3.783860629s","start":"2025-12-05T10:41:27.125358Z","end":"2025-12-05T10:41:30.909219Z","steps":["trace[1581928459] 'agreement among raft nodes before linearized reading' (duration: 3.783632953s)"],"step_count":1} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.909994Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:19.529748Z","time spent":"11.380231147s","remote":"[::1]:37316","response type":"/etcdserverpb.KV/Range","request count":0,"request size":114,"response count":1,"response size":160278,"request content":"key:\"/kubernetes.io/machineconfiguration.openshift.io/machineconfigs/rendered-worker-5237a1ca41d8ed74571ef4882dd5066c\" "} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.910003Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"11.408963487s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/rolebindings/openshift-machine-api/prometheus-k8s-machine-api-operator\" ","response":"range_response_count:1 size:1093"} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.910026Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"4.579966418s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/oauths/\" range_end:\"/kubernetes.io/config.openshift.io/oauths0\" count_only:true ","response":"range_response_count:0 size:7"} 2025-12-05T10:41:30.912505594Z {"level":"info","ts":"2025-12-05T10:41:30.910063Z","caller":"traceutil/trace.go:171","msg":"trace[1589523897] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-machine-api/prometheus-k8s-machine-api-operator; range_end:; response_count:1; response_revision:10004; }","duration":"11.409049849s","start":"2025-12-05T10:41:19.500996Z","end":"2025-12-05T10:41:30.910046Z","steps":["trace[1589523897] 'agreement among raft nodes before linearized reading' (duration: 11.408952407s)"],"step_count":1} 2025-12-05T10:41:30.912505594Z {"level":"info","ts":"2025-12-05T10:41:30.910075Z","caller":"traceutil/trace.go:171","msg":"trace[1538341847] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/oauths/; range_end:/kubernetes.io/config.openshift.io/oauths0; response_count:0; response_revision:10004; }","duration":"4.58004017s","start":"2025-12-05T10:41:26.330021Z","end":"2025-12-05T10:41:30.910061Z","steps":["trace[1538341847] 'agreement among raft nodes before linearized reading' (duration: 4.579966548s)"],"step_count":1} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.910110Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:19.500980Z","time spent":"11.409117971s","remote":"[::1]:37196","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":1117,"request content":"key:\"/kubernetes.io/rolebindings/openshift-machine-api/prometheus-k8s-machine-api-operator\" "} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.910023Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:27.125334Z","time spent":"3.784681291s","remote":"[::1]:36786","response type":"/etcdserverpb.KV/Range","request count":0,"request size":62,"response count":257,"response size":32,"request content":"key:\"/kubernetes.io/clusterroles/\" range_end:\"/kubernetes.io/clusterroles0\" count_only:true "} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.910145Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:26.330008Z","time spent":"4.580097632s","remote":"[::1]:36882","response type":"/etcdserverpb.KV/Range","request count":0,"request size":90,"response count":1,"response size":31,"request content":"key:\"/kubernetes.io/config.openshift.io/oauths/\" range_end:\"/kubernetes.io/config.openshift.io/oauths0\" count_only:true "} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.910196Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"4.913095216s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/flowschemas/\" range_end:\"/kubernetes.io/flowschemas0\" count_only:true ","response":"range_response_count:0 size:7"} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.908891Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"3.911682931s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/mutatingwebhookconfigurations/\" range_end:\"/kubernetes.io/mutatingwebhookconfigurations0\" count_only:true ","response":"range_response_count:0 size:7"} 2025-12-05T10:41:30.912505594Z {"level":"info","ts":"2025-12-05T10:41:30.910214Z","caller":"traceutil/trace.go:171","msg":"trace[1980098221] range","detail":"{range_begin:/kubernetes.io/flowschemas/; range_end:/kubernetes.io/flowschemas0; response_count:0; response_revision:10004; }","duration":"4.913144747s","start":"2025-12-05T10:41:25.997065Z","end":"2025-12-05T10:41:30.910210Z","steps":["trace[1980098221] 'agreement among raft nodes before linearized reading' (duration: 4.913108927s)"],"step_count":1} 2025-12-05T10:41:30.912505594Z {"level":"info","ts":"2025-12-05T10:41:30.910226Z","caller":"traceutil/trace.go:171","msg":"trace[1290908559] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations/; range_end:/kubernetes.io/mutatingwebhookconfigurations0; response_count:0; response_revision:10004; }","duration":"3.913052517s","start":"2025-12-05T10:41:26.997167Z","end":"2025-12-05T10:41:30.910219Z","steps":["trace[1290908559] 'agreement among raft nodes before linearized reading' (duration: 3.911649971s)"],"step_count":1} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.910251Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:26.997148Z","time spent":"3.913096007s","remote":"[::1]:37034","response type":"/etcdserverpb.KV/Range","request count":0,"request size":96,"response count":1,"response size":31,"request content":"key:\"/kubernetes.io/mutatingwebhookconfigurations/\" range_end:\"/kubernetes.io/mutatingwebhookconfigurations0\" count_only:true "} 2025-12-05T10:41:30.912505594Z {"level":"warn","ts":"2025-12-05T10:41:30.910275Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"5.321896292s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/replicasets/\" range_end:\"/kubernetes.io/replicasets0\" count_only:true ","response":"range_response_count:0 size:7"} 2025-12-05T10:41:30.912505594Z {"level":"info","ts":"2025-12-05T10:41:30.909246Z","caller":"traceutil/trace.go:171","msg":"trace[1393171942] range","detail":"{range_begin:/kubernetes.io/controllerrevisions/; range_end:/kubernetes.io/controllerrevisions0; response_count:0; response_revision:10004; }","duration":"9.793759836s","start":"2025-12-05T10:41:21.115481Z","end":"2025-12-05T10:41:30.909241Z","steps":["trace[1393171942] 'agreement among raft nodes before linearized reading' (duration: 9.793725955s)"],"step_count":1} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.909862Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"8.839300781s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operator.openshift.io/kubecontrollermanagers/cluster\" ","response":"range_response_count:1 size:20570"} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.910231Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:25.997039Z","time spent":"4.913186938s","remote":"[::1]:57682","response type":"/etcdserverpb.KV/Range","request count":0,"request size":60,"response count":15,"response size":31,"request content":"key:\"/kubernetes.io/flowschemas/\" range_end:\"/kubernetes.io/flowschemas0\" count_only:true "} 2025-12-05T10:41:30.912558075Z {"level":"info","ts":"2025-12-05T10:41:30.910342Z","caller":"traceutil/trace.go:171","msg":"trace[898300370] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/kubecontrollermanagers/cluster; range_end:; response_count:1; response_revision:10004; }","duration":"8.839806924s","start":"2025-12-05T10:41:22.070527Z","end":"2025-12-05T10:41:30.910334Z","steps":["trace[898300370] 'agreement among raft nodes before linearized reading' (duration: 8.83926849s)"],"step_count":1} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.908965Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:28.353610Z","time spent":"2.555351307s","remote":"[::1]:37064","response type":"/etcdserverpb.KV/Range","request count":0,"request size":134,"response count":12,"response size":31,"request content":"key:\"/kubernetes.io/security.openshift.io/securitycontextconstraints/\" range_end:\"/kubernetes.io/security.openshift.io/securitycontextconstraints0\" count_only:true "} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.910372Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:22.070508Z","time spent":"8.839855714s","remote":"[::1]:33946","response type":"/etcdserverpb.KV/Range","request count":0,"request size":69,"response count":1,"response size":20594,"request content":"key:\"/kubernetes.io/operator.openshift.io/kubecontrollermanagers/cluster\" "} 2025-12-05T10:41:30.912558075Z {"level":"info","ts":"2025-12-05T10:41:30.909918Z","caller":"traceutil/trace.go:171","msg":"trace[1069574873] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/cluster-autoscaler; range_end:; response_count:1; response_revision:10004; }","duration":"11.408510884s","start":"2025-12-05T10:41:19.501401Z","end":"2025-12-05T10:41:30.909912Z","steps":["trace[1069574873] 'agreement among raft nodes before linearized reading' (duration: 11.408470263s)"],"step_count":1} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.910433Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:19.501377Z","time spent":"11.409032887s","remote":"[::1]:37014","response type":"/etcdserverpb.KV/Range","request count":0,"request size":72,"response count":1,"response size":2578,"request content":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/cluster-autoscaler\" "} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.909461Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:20.044233Z","time spent":"10.865224157s","remote":"[::1]:37014","response type":"/etcdserverpb.KV/Range","request count":0,"request size":88,"response count":1,"response size":2488,"request content":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-catalog\" "} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.909898Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"8.839908607s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods\" limit:1 ","response":"range_response_count:0 size:5"} 2025-12-05T10:41:30.912558075Z {"level":"info","ts":"2025-12-05T10:41:30.910562Z","caller":"traceutil/trace.go:171","msg":"trace[1882367712] range","detail":"{range_begin:/kubernetes.io/pods; range_end:; response_count:0; response_revision:10004; }","duration":"8.840607454s","start":"2025-12-05T10:41:22.069948Z","end":"2025-12-05T10:41:30.910556Z","steps":["trace[1882367712] 'agreement among raft nodes before linearized reading' (duration: 8.839930487s)"],"step_count":1} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.910585Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:22.069928Z","time spent":"8.840650156s","remote":"[::1]:37048","response type":"/etcdserverpb.KV/Range","request count":0,"request size":23,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/pods\" limit:1 "} 2025-12-05T10:41:30.912558075Z {"level":"info","ts":"2025-12-05T10:41:30.910290Z","caller":"traceutil/trace.go:171","msg":"trace[1811367571] range","detail":"{range_begin:/kubernetes.io/replicasets/; range_end:/kubernetes.io/replicasets0; response_count:0; response_revision:10004; }","duration":"5.321935723s","start":"2025-12-05T10:41:25.588349Z","end":"2025-12-05T10:41:30.910285Z","steps":["trace[1811367571] 'agreement among raft nodes before linearized reading' (duration: 5.321889352s)"],"step_count":1} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.910641Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:25.588334Z","time spent":"5.322298572s","remote":"[::1]:33790","response type":"/etcdserverpb.KV/Range","request count":0,"request size":60,"response count":60,"response size":31,"request content":"key:\"/kubernetes.io/replicasets/\" range_end:\"/kubernetes.io/replicasets0\" count_only:true "} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.910331Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:21.115466Z","time spent":"9.794846774s","remote":"[::1]:34126","response type":"/etcdserverpb.KV/Range","request count":0,"request size":76,"response count":13,"response size":31,"request content":"key:\"/kubernetes.io/controllerrevisions/\" range_end:\"/kubernetes.io/controllerrevisions0\" count_only:true "} 2025-12-05T10:41:30.912558075Z {"level":"info","ts":"2025-12-05T10:41:30.911087Z","caller":"traceutil/trace.go:171","msg":"trace[417952122] linearizableReadLoop","detail":"{readStateIndex:10464; appliedIndex:10457; }","duration":"2.41096378s","start":"2025-12-05T10:41:28.497855Z","end":"2025-12-05T10:41:30.908819Z","steps":["trace[417952122] 'read index received' (duration: 1.45521307s)","trace[417952122] 'applied index is now lower than readState.Index' (duration: 955.7501ms)"],"step_count":2} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.911144Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"11.41258564s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/minions/master-0\" ","response":"range_response_count:1 size:11514"} 2025-12-05T10:41:30.912558075Z {"level":"info","ts":"2025-12-05T10:41:30.911360Z","caller":"traceutil/trace.go:171","msg":"trace[1783516771] range","detail":"{range_begin:/kubernetes.io/minions/master-0; range_end:; response_count:1; response_revision:10004; }","duration":"11.412810955s","start":"2025-12-05T10:41:19.498533Z","end":"2025-12-05T10:41:30.911344Z","steps":["trace[1783516771] 'agreement among raft nodes before linearized reading' (duration: 11.412583339s)"],"step_count":1} 2025-12-05T10:41:30.912558075Z {"level":"warn","ts":"2025-12-05T10:41:30.911415Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:19.498521Z","time spent":"11.412880277s","remote":"[::1]:37596","response type":"/etcdserverpb.KV/Range","request count":0,"request size":33,"response count":1,"response size":11538,"request content":"key:\"/kubernetes.io/minions/master-0\" "} 2025-12-05T10:41:30.916535768Z {"level":"info","ts":"2025-12-05T10:41:30.913634Z","caller":"traceutil/trace.go:171","msg":"trace[286954249] transaction","detail":"{read_only:false; response_revision:10006; number_of_response:1; }","duration":"345.365832ms","start":"2025-12-05T10:41:30.568252Z","end":"2025-12-05T10:41:30.913618Z","steps":["trace[286954249] 'process raft request' (duration: 345.30074ms)"],"step_count":1} 2025-12-05T10:41:30.916535768Z {"level":"warn","ts":"2025-12-05T10:41:30.913761Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:30.568232Z","time spent":"345.462606ms","remote":"[::1]:37208","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":700,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2025-12-05T10:41:30.916535768Z {"level":"info","ts":"2025-12-05T10:41:30.913848Z","caller":"traceutil/trace.go:171","msg":"trace[341877535] transaction","detail":"{read_only:false; response_revision:10007; number_of_response:1; }","duration":"329.795502ms","start":"2025-12-05T10:41:30.584030Z","end":"2025-12-05T10:41:30.913825Z","steps":["trace[341877535] 'process raft request' (duration: 329.559505ms)"],"step_count":1} 2025-12-05T10:41:30.916535768Z {"level":"info","ts":"2025-12-05T10:41:30.913922Z","caller":"traceutil/trace.go:171","msg":"trace[1121075593] transaction","detail":"{read_only:false; response_revision:10005; number_of_response:1; }","duration":"549.972031ms","start":"2025-12-05T10:41:30.363942Z","end":"2025-12-05T10:41:30.913914Z","steps":["trace[1121075593] 'process raft request' (duration: 549.519579ms)"],"step_count":1} 2025-12-05T10:41:30.916535768Z {"level":"warn","ts":"2025-12-05T10:41:30.913962Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:30.363895Z","time spent":"550.045003ms","remote":"[::1]:37208","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":560,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2025-12-05T10:41:30.916535768Z {"level":"warn","ts":"2025-12-05T10:41:30.913970Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:30.584003Z","time spent":"329.908415ms","remote":"[::1]:37208","response type":"/etcdserverpb.KV/Txn","request count":1,"request size":536,"response count":0,"response size":40,"request content":"compare: success:> failure: >"} 2025-12-05T10:41:30.916535768Z {"level":"warn","ts":"2025-12-05T10:41:30.916206Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"2.41566565s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/machineconfiguration.openshift.io/machineosconfigs\" limit:1 ","response":"range_response_count:0 size:5"} 2025-12-05T10:41:30.916535768Z {"level":"info","ts":"2025-12-05T10:41:30.916296Z","caller":"traceutil/trace.go:171","msg":"trace[1138778836] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/machineosconfigs; range_end:; response_count:0; response_revision:10007; }","duration":"2.415756003s","start":"2025-12-05T10:41:28.500494Z","end":"2025-12-05T10:41:30.916250Z","steps":["trace[1138778836] 'agreement among raft nodes before linearized reading' (duration: 2.4156651s)"],"step_count":1} 2025-12-05T10:41:30.916535768Z {"level":"warn","ts":"2025-12-05T10:41:30.916334Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:28.500482Z","time spent":"2.415843505s","remote":"[::1]:34172","response type":"/etcdserverpb.KV/Range","request count":0,"request size":69,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/machineconfiguration.openshift.io/machineosconfigs\" limit:1 "} 2025-12-05T10:41:30.916624200Z {"level":"warn","ts":"2025-12-05T10:41:30.916601Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.213368063s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2025-12-05T10:41:30.916645321Z {"level":"info","ts":"2025-12-05T10:41:30.916622Z","caller":"traceutil/trace.go:171","msg":"trace[1754416284] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10007; }","duration":"1.213407844s","start":"2025-12-05T10:41:29.703208Z","end":"2025-12-05T10:41:30.916616Z","steps":["trace[1754416284] 'agreement among raft nodes before linearized reading' (duration: 1.213370443s)"],"step_count":1} 2025-12-05T10:41:30.916664541Z {"level":"warn","ts":"2025-12-05T10:41:30.916638Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.703199Z","time spent":"1.213435604s","remote":"[::1]:34136","response type":"/etcdserverpb.KV/Range","request count":0,"request size":50,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/validatingwebhookconfigurations\" limit:1 "} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.916674Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.213128227s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/machineconfiguration.openshift.io/machineconfigs/01-worker-container-runtime\" ","response":"range_response_count:1 size:8125"} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.916766Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.215151828s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:controller:privileged-namespaces-psa-label-syncer\" ","response":"range_response_count:1 size:621"} 2025-12-05T10:41:30.917725228Z {"level":"info","ts":"2025-12-05T10:41:30.916758Z","caller":"traceutil/trace.go:171","msg":"trace[977801096] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/machineconfigs/01-worker-container-runtime; range_end:; response_count:1; response_revision:10007; }","duration":"1.213221459s","start":"2025-12-05T10:41:29.703518Z","end":"2025-12-05T10:41:30.916739Z","steps":["trace[977801096] 'agreement among raft nodes before linearized reading' (duration: 1.212991843s)"],"step_count":1} 2025-12-05T10:41:30.917725228Z {"level":"info","ts":"2025-12-05T10:41:30.916784Z","caller":"traceutil/trace.go:171","msg":"trace[688980414] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:controller:privileged-namespaces-psa-label-syncer; range_end:; response_count:1; response_revision:10007; }","duration":"1.215223251s","start":"2025-12-05T10:41:29.701555Z","end":"2025-12-05T10:41:30.916779Z","steps":["trace[688980414] 'agreement among raft nodes before linearized reading' (duration: 1.21517606s)"],"step_count":1} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.916799Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.701521Z","time spent":"1.215275191s","remote":"[::1]:34268","response type":"/etcdserverpb.KV/Range","request count":0,"request size":103,"response count":1,"response size":645,"request content":"key:\"/kubernetes.io/clusterrolebindings/system:openshift:controller:privileged-namespaces-psa-label-syncer\" "} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.916814Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.703487Z","time spent":"1.213311171s","remote":"[::1]:37316","response type":"/etcdserverpb.KV/Range","request count":0,"request size":93,"response count":1,"response size":8149,"request content":"key:\"/kubernetes.io/machineconfiguration.openshift.io/machineconfigs/01-worker-container-runtime\" "} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.916892Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.215698043s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook\" ","response":"range_response_count:1 size:5206"} 2025-12-05T10:41:30.917725228Z {"level":"info","ts":"2025-12-05T10:41:30.916907Z","caller":"traceutil/trace.go:171","msg":"trace[540421639] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook; range_end:; response_count:1; response_revision:10007; }","duration":"1.215753764s","start":"2025-12-05T10:41:29.701148Z","end":"2025-12-05T10:41:30.916902Z","steps":["trace[540421639] 'agreement among raft nodes before linearized reading' (duration: 1.215720063s)"],"step_count":1} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.916921Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.701124Z","time spent":"1.215793674s","remote":"[::1]:37332","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":5230,"request content":"key:\"/kubernetes.io/deployments/openshift-monitoring/prometheus-operator-admission-webhook\" "} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.917009Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.218995568s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/operators.coreos.com/operatorgroups/openshift-operators/global-operators\" ","response":"range_response_count:1 size:1664"} 2025-12-05T10:41:30.917725228Z {"level":"info","ts":"2025-12-05T10:41:30.917025Z","caller":"traceutil/trace.go:171","msg":"trace[2060465585] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/operatorgroups/openshift-operators/global-operators; range_end:; response_count:1; response_revision:10007; }","duration":"1.219038299s","start":"2025-12-05T10:41:29.697983Z","end":"2025-12-05T10:41:30.917021Z","steps":["trace[2060465585] 'agreement among raft nodes before linearized reading' (duration: 1.219006998s)"],"step_count":1} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.917037Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.697967Z","time spent":"1.219067579s","remote":"[::1]:33812","response type":"/etcdserverpb.KV/Range","request count":0,"request size":89,"response count":1,"response size":1688,"request content":"key:\"/kubernetes.io/operators.coreos.com/operatorgroups/openshift-operators/global-operators\" "} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.917076Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"250.283955ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/namespaces/openshift-kube-storage-version-migrator\" ","response":"range_response_count:1 size:1240"} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.917119Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.507947087s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/metal3.io/baremetalhosts/\" range_end:\"/kubernetes.io/metal3.io/baremetalhosts0\" count_only:true ","response":"range_response_count:0 size:5"} 2025-12-05T10:41:30.917725228Z {"level":"info","ts":"2025-12-05T10:41:30.917120Z","caller":"traceutil/trace.go:171","msg":"trace[1542888402] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-kube-storage-version-migrator; range_end:; response_count:1; response_revision:10007; }","duration":"250.342576ms","start":"2025-12-05T10:41:30.666763Z","end":"2025-12-05T10:41:30.917106Z","steps":["trace[1542888402] 'agreement among raft nodes before linearized reading' (duration: 250.255964ms)"],"step_count":1} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.917154Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.69329723s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/migration.k8s.io/storageversionmigrations/\" range_end:\"/kubernetes.io/migration.k8s.io/storageversionmigrations0\" count_only:true ","response":"range_response_count:0 size:7"} 2025-12-05T10:41:30.917725228Z {"level":"info","ts":"2025-12-05T10:41:30.917169Z","caller":"traceutil/trace.go:171","msg":"trace[326527741] range","detail":"{range_begin:/kubernetes.io/migration.k8s.io/storageversionmigrations/; range_end:/kubernetes.io/migration.k8s.io/storageversionmigrations0; response_count:0; response_revision:10007; }","duration":"1.693346871s","start":"2025-12-05T10:41:29.223818Z","end":"2025-12-05T10:41:30.917165Z","steps":["trace[326527741] 'agreement among raft nodes before linearized reading' (duration: 1.69332392s)"],"step_count":1} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.917183Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.223800Z","time spent":"1.693379602s","remote":"[::1]:34322","response type":"/etcdserverpb.KV/Range","request count":0,"request size":120,"response count":6,"response size":31,"request content":"key:\"/kubernetes.io/migration.k8s.io/storageversionmigrations/\" range_end:\"/kubernetes.io/migration.k8s.io/storageversionmigrations0\" count_only:true "} 2025-12-05T10:41:30.917725228Z {"level":"warn","ts":"2025-12-05T10:41:30.917284Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.947780942s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/quota.openshift.io/clusterresourcequotas/\" range_end:\"/kubernetes.io/quota.openshift.io/clusterresourcequotas0\" count_only:true ","response":"range_response_count:0 size:5"} 2025-12-05T10:41:30.917808380Z {"level":"info","ts":"2025-12-05T10:41:30.917300Z","caller":"traceutil/trace.go:171","msg":"trace[459021936] range","detail":"{range_begin:/kubernetes.io/quota.openshift.io/clusterresourcequotas/; range_end:/kubernetes.io/quota.openshift.io/clusterresourcequotas0; response_count:0; response_revision:10007; }","duration":"1.947827424s","start":"2025-12-05T10:41:28.969468Z","end":"2025-12-05T10:41:30.917295Z","steps":["trace[459021936] 'agreement among raft nodes before linearized reading' (duration: 1.947798133s)"],"step_count":1} 2025-12-05T10:41:30.917808380Z {"level":"warn","ts":"2025-12-05T10:41:30.917315Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:28.969442Z","time spent":"1.947868445s","remote":"[::1]:36750","response type":"/etcdserverpb.KV/Range","request count":0,"request size":118,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/quota.openshift.io/clusterresourcequotas/\" range_end:\"/kubernetes.io/quota.openshift.io/clusterresourcequotas0\" count_only:true "} 2025-12-05T10:41:30.917808380Z {"level":"warn","ts":"2025-12-05T10:41:30.917378Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"250.619814ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-kube-storage-version-migrator/migrator\" ","response":"range_response_count:1 size:4287"} 2025-12-05T10:41:30.917808380Z {"level":"info","ts":"2025-12-05T10:41:30.917491Z","caller":"traceutil/trace.go:171","msg":"trace[1180286118] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-kube-storage-version-migrator/migrator; range_end:; response_count:1; response_revision:10007; }","duration":"250.686415ms","start":"2025-12-05T10:41:30.666723Z","end":"2025-12-05T10:41:30.917409Z","steps":["trace[1180286118] 'agreement among raft nodes before linearized reading' (duration: 250.605783ms)"],"step_count":1} 2025-12-05T10:41:30.917808380Z {"level":"warn","ts":"2025-12-05T10:41:30.917721Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"906.08264ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/serviceaccounts/openshift-kube-controller-manager/installer-sa\" ","response":"range_response_count:1 size:686"} 2025-12-05T10:41:30.917808380Z {"level":"info","ts":"2025-12-05T10:41:30.917761Z","caller":"traceutil/trace.go:171","msg":"trace[1253382297] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-kube-controller-manager/installer-sa; range_end:; response_count:1; response_revision:10007; }","duration":"906.148302ms","start":"2025-12-05T10:41:30.011601Z","end":"2025-12-05T10:41:30.917749Z","steps":["trace[1253382297] 'agreement among raft nodes before linearized reading' (duration: 906.07356ms)"],"step_count":1} 2025-12-05T10:41:30.917835921Z {"level":"warn","ts":"2025-12-05T10:41:30.917796Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:30.011585Z","time spent":"906.202753ms","remote":"[::1]:34166","response type":"/etcdserverpb.KV/Range","request count":0,"request size":79,"response count":1,"response size":710,"request content":"key:\"/kubernetes.io/serviceaccounts/openshift-kube-controller-manager/installer-sa\" "} 2025-12-05T10:41:30.918022206Z {"level":"warn","ts":"2025-12-05T10:41:30.917975Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.214065371s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/deployments/openshift-cluster-storage-operator/csi-snapshot-controller\" ","response":"range_response_count:1 size:3714"} 2025-12-05T10:41:30.918022206Z {"level":"info","ts":"2025-12-05T10:41:30.918005Z","caller":"traceutil/trace.go:171","msg":"trace[403583199] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-cluster-storage-operator/csi-snapshot-controller; range_end:; response_count:1; response_revision:10007; }","duration":"1.214123342s","start":"2025-12-05T10:41:29.703875Z","end":"2025-12-05T10:41:30.917998Z","steps":["trace[403583199] 'agreement among raft nodes before linearized reading' (duration: 1.214067321s)"],"step_count":1} 2025-12-05T10:41:30.918044057Z {"level":"warn","ts":"2025-12-05T10:41:30.918026Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.703862Z","time spent":"1.214159534s","remote":"[::1]:37332","response type":"/etcdserverpb.KV/Range","request count":0,"request size":87,"response count":1,"response size":3738,"request content":"key:\"/kubernetes.io/deployments/openshift-cluster-storage-operator/csi-snapshot-controller\" "} 2025-12-05T10:41:30.918044057Z {"level":"info","ts":"2025-12-05T10:41:30.917134Z","caller":"traceutil/trace.go:171","msg":"trace[384939972] range","detail":"{range_begin:/kubernetes.io/metal3.io/baremetalhosts/; range_end:/kubernetes.io/metal3.io/baremetalhosts0; response_count:0; response_revision:10007; }","duration":"1.507995259s","start":"2025-12-05T10:41:29.409134Z","end":"2025-12-05T10:41:30.917129Z","steps":["trace[384939972] 'agreement among raft nodes before linearized reading' (duration: 1.507968768s)"],"step_count":1} 2025-12-05T10:41:30.921494555Z {"level":"warn","ts":"2025-12-05T10:41:30.918073Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.409116Z","time spent":"1.508937974s","remote":"[::1]:36774","response type":"/etcdserverpb.KV/Range","request count":0,"request size":86,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/metal3.io/baremetalhosts/\" range_end:\"/kubernetes.io/metal3.io/baremetalhosts0\" count_only:true "} 2025-12-05T10:41:30.921494555Z {"level":"warn","ts":"2025-12-05T10:41:30.918135Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"957.016683ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/cloud-credential\" ","response":"range_response_count:1 size:8697"} 2025-12-05T10:41:30.921494555Z {"level":"info","ts":"2025-12-05T10:41:30.918160Z","caller":"traceutil/trace.go:171","msg":"trace[917768548] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/cloud-credential; range_end:; response_count:1; response_revision:10007; }","duration":"957.066103ms","start":"2025-12-05T10:41:29.961085Z","end":"2025-12-05T10:41:30.918152Z","steps":["trace[917768548] 'agreement among raft nodes before linearized reading' (duration: 957.020642ms)"],"step_count":1} 2025-12-05T10:41:30.921494555Z {"level":"warn","ts":"2025-12-05T10:41:30.918180Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.961069Z","time spent":"957.105625ms","remote":"[::1]:37014","response type":"/etcdserverpb.KV/Range","request count":0,"request size":70,"response count":1,"response size":8721,"request content":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/cloud-credential\" "} 2025-12-05T10:41:30.921494555Z {"level":"warn","ts":"2025-12-05T10:41:30.918307Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.032970018s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/marketplace\" ","response":"range_response_count:1 size:2751"} 2025-12-05T10:41:30.921494555Z {"level":"info","ts":"2025-12-05T10:41:30.918338Z","caller":"traceutil/trace.go:171","msg":"trace[1983241783] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/marketplace; range_end:; response_count:1; response_revision:10007; }","duration":"1.033019569s","start":"2025-12-05T10:41:29.885312Z","end":"2025-12-05T10:41:30.918332Z","steps":["trace[1983241783] 'agreement among raft nodes before linearized reading' (duration: 1.032964747s)"],"step_count":1} 2025-12-05T10:41:30.921494555Z {"level":"warn","ts":"2025-12-05T10:41:30.918354Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.885297Z","time spent":"1.03305343s","remote":"[::1]:37014","response type":"/etcdserverpb.KV/Range","request count":0,"request size":65,"response count":1,"response size":2775,"request content":"key:\"/kubernetes.io/config.openshift.io/clusteroperators/marketplace\" "} 2025-12-05T10:41:30.921494555Z {"level":"warn","ts":"2025-12-05T10:41:30.918463Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.1658769s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/pods\" limit:1 ","response":"range_response_count:0 size:5"} 2025-12-05T10:41:30.921494555Z {"level":"info","ts":"2025-12-05T10:41:30.918484Z","caller":"traceutil/trace.go:171","msg":"trace[481486201] range","detail":"{range_begin:/kubernetes.io/pods; range_end:; response_count:0; response_revision:10007; }","duration":"1.165923021s","start":"2025-12-05T10:41:29.752554Z","end":"2025-12-05T10:41:30.918477Z","steps":["trace[481486201] 'agreement among raft nodes before linearized reading' (duration: 1.165892691s)"],"step_count":1} 2025-12-05T10:41:30.921494555Z {"level":"warn","ts":"2025-12-05T10:41:30.918499Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.752532Z","time spent":"1.165963602s","remote":"[::1]:37048","response type":"/etcdserverpb.KV/Range","request count":0,"request size":23,"response count":0,"response size":29,"request content":"key:\"/kubernetes.io/pods\" limit:1 "} 2025-12-05T10:41:30.921494555Z {"level":"warn","ts":"2025-12-05T10:41:30.918602Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"1.212374507s","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/minions/master-0\" ","response":"range_response_count:1 size:11514"} 2025-12-05T10:41:30.921494555Z {"level":"info","ts":"2025-12-05T10:41:30.918621Z","caller":"traceutil/trace.go:171","msg":"trace[1070955691] range","detail":"{range_begin:/kubernetes.io/minions/master-0; range_end:; response_count:1; response_revision:10007; }","duration":"1.212410798s","start":"2025-12-05T10:41:29.706205Z","end":"2025-12-05T10:41:30.918616Z","steps":["trace[1070955691] 'agreement among raft nodes before linearized reading' (duration: 1.212373547s)"],"step_count":1} 2025-12-05T10:41:30.921494555Z {"level":"warn","ts":"2025-12-05T10:41:30.918637Z","caller":"v3rpc/interceptor.go:197","msg":"request stats","start time":"2025-12-05T10:41:29.706192Z","time spent":"1.212441988s","remote":"[::1]:37596","response type":"/etcdserverpb.KV/Range","request count":0,"request size":33,"response count":1,"response size":11538,"request content":"key:\"/kubernetes.io/minions/master-0\" "} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715114533341023122 0ustar00000000000000002025-12-05T10:38:46.508668842Z Fixing etcd log permissions.Fixing etcd auto backup permissions.machine-api-operator_current.log0000640000000000000000000003004415114533341033100 0ustar0000000000000000config/pod/openshift-machine-api/logs/machine-api-operator-88d48b57d-x7jfs2025-12-05T10:41:03.849754283Z I1205 10:41:03.849238 1 start.go:72] Version: 4.18.0-202511181540.p2.g609dbab.assembly.stream.el9 2025-12-05T10:41:03.849754283Z I1205 10:41:03.849544 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-05T10:41:03.878521124Z I1205 10:41:03.876973 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/machine-api-operator... 2025-12-05T10:41:03.954884949Z I1205 10:41:03.954579 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/machine-api-operator 2025-12-05T10:41:03.977523052Z I1205 10:41:03.977232 1 operator.go:217] Starting Machine API Operator 2025-12-05T10:41:03.977523052Z I1205 10:41:03.977334 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-05T10:41:03.977523052Z I1205 10:41:03.977344 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-05T10:41:03.977523052Z I1205 10:41:03.977362 1 reflector.go:305] Starting reflector *v1.Deployment (11m51.257676882s) from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.977523052Z I1205 10:41:03.977368 1 reflector.go:341] Listing and watching *v1.Deployment from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.982181903Z I1205 10:41:03.977611 1 reflector.go:305] Starting reflector *v1.DaemonSet (11m51.257676882s) from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.982181903Z I1205 10:41:03.977623 1 reflector.go:341] Listing and watching *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.982181903Z I1205 10:41:03.977740 1 reflector.go:305] Starting reflector *v1.ValidatingWebhookConfiguration (11m51.257676882s) from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.982181903Z I1205 10:41:03.977746 1 reflector.go:341] Listing and watching *v1.ValidatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.982181903Z I1205 10:41:03.977916 1 reflector.go:305] Starting reflector *v1.MutatingWebhookConfiguration (11m51.257676882s) from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.982181903Z I1205 10:41:03.977923 1 reflector.go:341] Listing and watching *v1.MutatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.982181903Z I1205 10:41:03.978078 1 reflector.go:305] Starting reflector *v1.ClusterOperator (14m4.198570581s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.978122 1 reflector.go:341] Listing and watching *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.978171 1 reflector.go:305] Starting reflector *v1beta1.MachineSet (10m57.823715818s) from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.978178 1 reflector.go:341] Listing and watching *v1beta1.MachineSet from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.978579 1 reflector.go:305] Starting reflector *v1beta1.Machine (10m57.823715818s) from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.978589 1 reflector.go:341] Listing and watching *v1beta1.Machine from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.978854 1 reflector.go:305] Starting reflector *v1.ClusterVersion (14m4.198570581s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.978864 1 reflector.go:341] Listing and watching *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.979118 1 reflector.go:305] Starting reflector *v1.FeatureGate (14m4.198570581s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.979135 1 reflector.go:341] Listing and watching *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.979582 1 reflector.go:305] Starting reflector *v1.Proxy (14m4.198570581s) from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.979591 1 reflector.go:341] Listing and watching *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:03.982181903Z I1205 10:41:03.979909 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.982181903Z I1205 10:41:03.980291 1 reflector.go:368] Caches populated for *v1.MutatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.982181903Z I1205 10:41:03.981534 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.983092296Z I1205 10:41:03.983053 1 reflector.go:368] Caches populated for *v1beta1.Machine from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2025-12-05T10:41:03.983596839Z I1205 10:41:03.983556 1 reflector.go:368] Caches populated for *v1.ValidatingWebhookConfiguration from k8s.io/client-go/informers/factory.go:160 2025-12-05T10:41:03.984040690Z I1205 10:41:03.984004 1 reflector.go:368] Caches populated for *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:03.984040690Z I1205 10:41:03.984018 1 reflector.go:368] Caches populated for *v1beta1.MachineSet from github.com/openshift/client-go/machine/informers/externalversions/factory.go:125 2025-12-05T10:41:03.987841478Z I1205 10:41:03.987599 1 reflector.go:368] Caches populated for *v1.FeatureGate from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:03.992626201Z I1205 10:41:03.991807 1 reflector.go:368] Caches populated for *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:04.007017572Z I1205 10:41:04.006300 1 reflector.go:368] Caches populated for *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125 2025-12-05T10:41:04.077722443Z I1205 10:41:04.077666 1 operator.go:229] Synced up caches 2025-12-05T10:41:04.077722443Z I1205 10:41:04.077694 1 operator.go:234] Started feature gate accessor 2025-12-05T10:41:04.077722443Z I1205 10:41:04.077715 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2025-12-05T10:41:04.077784054Z I1205 10:41:04.077716 1 start.go:121] Synced up machine api informer caches 2025-12-05T10:41:04.078613956Z I1205 10:41:04.078312 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-machine-api", Name:"machine-api-operator", UID:"d6e4f4f6-48e1-48b7-a7cf-f79b572ae6d8", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}} 2025-12-05T10:41:04.389004617Z I1205 10:41:04.388958 1 status.go:63] Syncing status: progressing 2025-12-05T10:41:04.389838539Z I1205 10:41:04.389208 1 event.go:377] Event(v1.ObjectReference{Kind:"ClusterOperator", Namespace:"", Name:"machine-api", UID:"93aaa644-92b7-4211-a3cc-fa8bd0ee4d18", APIVersion:"config.openshift.io/v1", ResourceVersion:"9641", FieldPath:""}): type: 'Normal' reason: 'Status upgrade' Progressing towards operator: 4.18.29 2025-12-05T10:41:04.398192054Z I1205 10:41:04.398083 1 sync.go:77] Provider is NoOp, skipping synchronisation 2025-12-05T10:41:04.404106197Z I1205 10:41:04.402780 1 status.go:99] Syncing status: available 2025-12-05T10:41:04.513869012Z I1205 10:41:04.512716 1 request.go:632] Waited for 80.855902ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2025-12-05T10:41:04.711775279Z I1205 10:41:04.711673 1 request.go:632] Waited for 180.400116ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2025-12-05T10:41:04.718029939Z I1205 10:41:04.717951 1 status.go:69] Syncing status: re-syncing 2025-12-05T10:41:04.912511197Z I1205 10:41:04.911769 1 request.go:632] Waited for 193.629087ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status 2025-12-05T10:41:04.921243562Z I1205 10:41:04.921101 1 sync.go:77] Provider is NoOp, skipping synchronisation 2025-12-05T10:41:05.111741867Z I1205 10:41:05.111664 1 request.go:632] Waited for 190.414983ms due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api 2025-12-05T10:41:05.115372381Z I1205 10:41:05.115310 1 status.go:99] Syncing status: available 2025-12-05T10:41:05.311898481Z I1205 10:41:05.311827 1 request.go:632] Waited for 196.313554ms due to client-side throttling, not priority and fairness, request: PUT:https://172.30.0.1:443/apis/config.openshift.io/v1/clusteroperators/machine-api/status kube-rbac-proxy_current.log0000640000000000000000000001524715114533341032116 0ustar0000000000000000config/pod/openshift-machine-api/logs/machine-api-operator-88d48b57d-x7jfs2025-12-05T10:40:49.607641957Z I1205 10:40:49.606929 1 flags.go:64] FLAG: --add-dir-header="false" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607091 1 flags.go:64] FLAG: --allow-paths="[]" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607106 1 flags.go:64] FLAG: --alsologtostderr="false" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607109 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607113 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607118 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607121 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607125 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607133 1 flags.go:64] FLAG: --client-ca-file="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607137 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607141 1 flags.go:64] FLAG: --help="false" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607145 1 flags.go:64] FLAG: --http2-disable="false" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607149 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607153 1 flags.go:64] FLAG: --http2-max-size="262144" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607157 1 flags.go:64] FLAG: --ignore-paths="[]" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607167 1 flags.go:64] FLAG: --insecure-listen-address="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607171 1 flags.go:64] FLAG: --kube-api-burst="0" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607176 1 flags.go:64] FLAG: --kube-api-qps="0" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607181 1 flags.go:64] FLAG: --kubeconfig="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607184 1 flags.go:64] FLAG: --log-backtrace-at="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607188 1 flags.go:64] FLAG: --log-dir="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607192 1 flags.go:64] FLAG: --log-file="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607196 1 flags.go:64] FLAG: --log-file-max-size="0" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607200 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607205 1 flags.go:64] FLAG: --logtostderr="true" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607209 1 flags.go:64] FLAG: --oidc-ca-file="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607212 1 flags.go:64] FLAG: --oidc-clientID="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607216 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607220 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607224 1 flags.go:64] FLAG: --oidc-issuer="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607235 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607252 1 flags.go:64] FLAG: --oidc-username-claim="email" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607256 1 flags.go:64] FLAG: --oidc-username-prefix="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607261 1 flags.go:64] FLAG: --one-output="false" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607265 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607278 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607283 1 flags.go:64] FLAG: --skip-headers="false" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607287 1 flags.go:64] FLAG: --skip-log-headers="false" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607290 1 flags.go:64] FLAG: --stderrthreshold="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607294 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607298 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607315 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607320 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607323 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607330 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607334 1 flags.go:64] FLAG: --upstream-ca-file="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607338 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607352 1 flags.go:64] FLAG: --upstream-client-key-file="" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607357 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607361 1 flags.go:64] FLAG: --v="3" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607365 1 flags.go:64] FLAG: --version="false" 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607373 1 flags.go:64] FLAG: --vmodule="" 2025-12-05T10:40:49.607641957Z W1205 10:40:49.607381 1 deprecated.go:66] 2025-12-05T10:40:49.607641957Z ==== Removed Flag Warning ====================== 2025-12-05T10:40:49.607641957Z 2025-12-05T10:40:49.607641957Z logtostderr is removed in the k8s upstream and has no effect any more. 2025-12-05T10:40:49.607641957Z 2025-12-05T10:40:49.607641957Z =============================================== 2025-12-05T10:40:49.607641957Z 2025-12-05T10:40:49.607641957Z I1205 10:40:49.607393 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2025-12-05T10:40:49.608452718Z I1205 10:40:49.608295 1 kube-rbac-proxy.go:233] Valid token audiences: 2025-12-05T10:40:49.616336921Z I1205 10:40:49.615844 1 kube-rbac-proxy.go:347] Reading certificate files 2025-12-05T10:40:49.617028009Z I1205 10:40:49.616985 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2025-12-05T10:40:49.617358457Z I1205 10:40:49.617308 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 control-plane-machine-set-operator_current.log0000640000000000000000000002700015114533341040647 0ustar0000000000000000config/pod/openshift-machine-api/logs/control-plane-machine-set-operator-7df95c79b5-qnq6t2025-12-05T10:38:31.355375082Z I1205 10:38:31.354739 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-05T10:38:31.356524485Z I1205 10:38:31.356238 1 simple_featuregate_reader.go:171] Starting feature-gate-detector 2025-12-05T10:38:31.366101205Z I1205 10:38:31.365864 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.187e4b7ea9fe0597 dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:FeatureGatesInitialized,Message:FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AWSEFSDriverVolumeMetrics", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BareMetalLoadBalancer", "BuildCSIVolumes", "ChunkSizeMiB", "CloudDualStackNodeIPs", "DisableKubeletCloudCredentialProviders", "GCPLabelsTags", "HardwareSpeed", "IngressControllerLBSubnetsAWS", "KMSv1", "ManagedBootImages", "ManagedBootImagesAWS", "MultiArchInstallAWS", "MultiArchInstallGCP", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "NewOLM", "NodeDisruptionPolicy", "OnClusterBuild", "PersistentIPsForVirtualization", "PrivateHostedZoneAWS", "SetEIPForNLBIngressController", "VSphereControlPlaneMachineSet", "VSphereDriverConfiguration", "VSphereMultiVCenters", "VSphereStaticIPs", "ValidatingAdmissionPolicy"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AdditionalRoutingCapabilities", "AutomatedEtcdBackup", "BootcNodeManagement", "CSIDriverSharedResource", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterMonitoringConfig", "ConsolePluginContentSecurityPolicy", "DNSNameResolver", "DynamicResourceAllocation", "EtcdBackendQuota", "EventedPLEG", "Example", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNS", "GatewayAPI", "ImageStreamImportMode", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsConfigAPI", "InsightsOnDemandDataGather", "InsightsRuntimeExtractor", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "MachineAPIProviderOpenStack", "MachineConfigNodes", "MaxUnavailableStatefulSet", "MetricsCollectionProfiles", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "NodeSwap", "NutanixMultiSubnets", "OVNObservability", "OpenShiftPodSecurityAdmission", "PinnedImages", "PlatformOperators", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SignatureStores", "SigstoreImageVerification", "StreamingCollectionEncodingToJSON", "StreamingCollectionEncodingToProtobuf", "TranslateStreamCloseWebsocketRequests", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiNetworks", "VolumeAttributesClass", "VolumeGroupSnapshot"}},Source:EventSource{Component:,Host:,},FirstTimestamp:2025-12-05 10:38:31.365772695 +0000 UTC m=+0.044548560,LastTimestamp:2025-12-05 10:38:31.365772695 +0000 UTC m=+0.044548560,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2025-12-05T10:38:31.366101205Z I1205 10:38:31.365922 1 main.go:175] FeatureGates initialized: [AWSEFSDriverVolumeMetrics AdminNetworkPolicy AlibabaPlatform AzureWorkloadIdentity BareMetalLoadBalancer BuildCSIVolumes ChunkSizeMiB CloudDualStackNodeIPs DisableKubeletCloudCredentialProviders GCPLabelsTags HardwareSpeed IngressControllerLBSubnetsAWS KMSv1 ManagedBootImages ManagedBootImagesAWS MultiArchInstallAWS MultiArchInstallGCP NetworkDiagnosticsConfig NetworkLiveMigration NetworkSegmentation NewOLM NodeDisruptionPolicy OnClusterBuild PersistentIPsForVirtualization PrivateHostedZoneAWS SetEIPForNLBIngressController VSphereControlPlaneMachineSet VSphereDriverConfiguration VSphereMultiVCenters VSphereStaticIPs ValidatingAdmissionPolicy AWSClusterHostedDNS AdditionalRoutingCapabilities AutomatedEtcdBackup BootcNodeManagement CSIDriverSharedResource ClusterAPIInstall ClusterAPIInstallIBMCloud ClusterMonitoringConfig ConsolePluginContentSecurityPolicy DNSNameResolver DynamicResourceAllocation EtcdBackendQuota EventedPLEG Example ExternalOIDC ExternalOIDCWithUIDAndExtraClaimMappings GCPClusterHostedDNS GatewayAPI ImageStreamImportMode IngressControllerDynamicConfigurationManager InsightsConfig InsightsConfigAPI InsightsOnDemandDataGather InsightsRuntimeExtractor MachineAPIMigration MachineAPIOperatorDisableMachineHealthCheckController MachineAPIProviderOpenStack MachineConfigNodes MaxUnavailableStatefulSet MetricsCollectionProfiles MinimumKubeletVersion MixedCPUsAllocation MultiArchInstallAzure NodeSwap NutanixMultiSubnets OVNObservability OpenShiftPodSecurityAdmission PinnedImages PlatformOperators ProcMountType RouteAdvertisements RouteExternalCertificate ServiceAccountTokenNodeBinding SignatureStores SigstoreImageVerification StreamingCollectionEncodingToJSON StreamingCollectionEncodingToProtobuf TranslateStreamCloseWebsocketRequests UpgradeStatus UserNamespacesPodSecurityStandards UserNamespacesSupport VSphereMultiNetworks VolumeAttributesClass VolumeGroupSnapshot] 2025-12-05T10:38:31.366170406Z I1205 10:38:31.366123 1 webhook.go:186] "skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" 2025-12-05T10:38:31.366170406Z I1205 10:38:31.366156 1 webhook.go:202] "Registering a validating webhook" logger="controller-runtime.builder" GVK="machine.openshift.io/v1, Kind=ControlPlaneMachineSet" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2025-12-05T10:38:31.366754434Z I1205 10:38:31.366214 1 server.go:183] "Registering webhook" logger="controller-runtime.webhook" path="/validate-machine-openshift-io-v1-controlplanemachineset" 2025-12-05T10:38:31.366754434Z I1205 10:38:31.366251 1 main.go:230] "starting manager" logger="setup" 2025-12-05T10:38:31.367013421Z I1205 10:38:31.366974 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" 2025-12-05T10:38:31.367128764Z I1205 10:38:31.367083 1 server.go:83] "starting server" name="health probe" addr="[::]:8081" 2025-12-05T10:38:31.367141254Z I1205 10:38:31.367124 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false 2025-12-05T10:38:31.367247047Z I1205 10:38:31.367126 1 server.go:191] "Starting webhook server" logger="controller-runtime.webhook" 2025-12-05T10:38:31.367340150Z I1205 10:38:31.367303 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/control-plane-machine-set-leader... 2025-12-05T10:38:31.367632918Z I1205 10:38:31.367606 1 certwatcher.go:161] "Updated current TLS certificate" logger="controller-runtime.certwatcher" 2025-12-05T10:38:31.367846025Z I1205 10:38:31.367781 1 server.go:242] "Serving webhook server" logger="controller-runtime.webhook" host="" port=9443 2025-12-05T10:38:31.370210431Z I1205 10:38:31.370141 1 certwatcher.go:115] "Starting certificate watcher" logger="controller-runtime.certwatcher" 2025-12-05T10:38:31.374715359Z I1205 10:38:31.374212 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/control-plane-machine-set-leader 2025-12-05T10:38:31.374715359Z I1205 10:38:31.374473 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.ControlPlaneMachineSet" 2025-12-05T10:38:31.374715359Z I1205 10:38:31.374490 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1beta1.Machine" 2025-12-05T10:38:31.374715359Z I1205 10:38:31.374498 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.Node" 2025-12-05T10:38:31.374715359Z I1205 10:38:31.374504 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.ClusterOperator" 2025-12-05T10:38:31.374715359Z I1205 10:38:31.374512 1 controller.go:175] "Starting EventSource" controller="controlplanemachineset" source="kind source: *v1.Infrastructure" 2025-12-05T10:38:31.374715359Z I1205 10:38:31.374519 1 controller.go:183] "Starting Controller" controller="controlplanemachineset" 2025-12-05T10:38:31.374715359Z I1205 10:38:31.374337 1 recorder.go:104] "control-plane-machine-set-operator-7df95c79b5-qnq6t_7773abee-854f-48bc-9e99-3fa3b9ad3268 became leader" logger="events" type="Normal" object={"kind":"Lease","namespace":"openshift-machine-api","name":"control-plane-machine-set-leader","uid":"d3f5aed5-13af-46d7-8f79-4827408975fa","apiVersion":"coordination.k8s.io/v1","resourceVersion":"8614"} reason="LeaderElection" 2025-12-05T10:38:31.374715359Z I1205 10:38:31.374684 1 controller.go:175] "Starting EventSource" controller="controlplanemachinesetgenerator" source="kind source: *v1.ControlPlaneMachineSet" 2025-12-05T10:38:31.374842732Z I1205 10:38:31.374716 1 controller.go:175] "Starting EventSource" controller="controlplanemachinesetgenerator" source="kind source: *v1beta1.Machine" 2025-12-05T10:38:31.374842732Z I1205 10:38:31.374730 1 controller.go:183] "Starting Controller" controller="controlplanemachinesetgenerator" 2025-12-05T10:38:31.496472330Z I1205 10:38:31.496375 1 controller.go:217] "Starting workers" controller="controlplanemachineset" worker count=1 2025-12-05T10:38:31.496523632Z I1205 10:38:31.496475 1 controller.go:217] "Starting workers" controller="controlplanemachinesetgenerator" worker count=1 2025-12-05T10:38:31.496634696Z I1205 10:38:31.496553 1 controller.go:170] "Reconciling control plane machine set" controller="controlplanemachineset" reconcileID="328b1a3b-dd3d-4f27-a8e2-97fbee69d6b3" namespace="openshift-machine-api" name="cluster" 2025-12-05T10:38:31.496709228Z I1205 10:38:31.496655 1 controller.go:178] "No control plane machine set found, setting operator status available" controller="controlplanemachineset" reconcileID="328b1a3b-dd3d-4f27-a8e2-97fbee69d6b3" namespace="openshift-machine-api" name="cluster" 2025-12-05T10:38:31.505794504Z I1205 10:38:31.505686 1 controller.go:184] "Finished reconciling control plane machine set" controller="controlplanemachineset" reconcileID="328b1a3b-dd3d-4f27-a8e2-97fbee69d6b3" namespace="openshift-machine-api" name="cluster" 2025-12-05T10:38:31.505794504Z I1205 10:38:31.505780 1 controller.go:170] "Reconciling control plane machine set" controller="controlplanemachineset" reconcileID="c4ce0c93-f40e-47ad-bfe5-fc86ea4bfce3" namespace="openshift-machine-api" name="cluster" 2025-12-05T10:38:31.505861236Z I1205 10:38:31.505831 1 controller.go:178] "No control plane machine set found, setting operator status available" controller="controlplanemachineset" reconcileID="c4ce0c93-f40e-47ad-bfe5-fc86ea4bfce3" namespace="openshift-machine-api" name="cluster" 2025-12-05T10:38:31.505921087Z I1205 10:38:31.505873 1 controller.go:184] "Finished reconciling control plane machine set" controller="controlplanemachineset" reconcileID="c4ce0c93-f40e-47ad-bfe5-fc86ea4bfce3" namespace="openshift-machine-api" name="cluster" 2025-12-05T10:39:31.385553586Z E1205 10:39:31.385467 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path baremetal-kube-rbac-proxy_current.log0000640000000000000000000001552515114533341035301 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-78f758c7b9-6t2gm2025-12-05T10:41:04.018390865Z I1205 10:41:04.018199 1 flags.go:64] FLAG: --add-dir-header="false" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018337 1 flags.go:64] FLAG: --allow-paths="[]" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018345 1 flags.go:64] FLAG: --alsologtostderr="false" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018348 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018351 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018356 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018359 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018362 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018367 1 flags.go:64] FLAG: --client-ca-file="" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018373 1 flags.go:64] FLAG: --config-file="/etc/baremetal-kube-rbac-proxy/config-file.yaml" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018376 1 flags.go:64] FLAG: --help="false" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018379 1 flags.go:64] FLAG: --http2-disable="false" 2025-12-05T10:41:04.018390865Z I1205 10:41:04.018382 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018386 1 flags.go:64] FLAG: --http2-max-size="262144" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018390 1 flags.go:64] FLAG: --ignore-paths="[]" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018394 1 flags.go:64] FLAG: --insecure-listen-address="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018396 1 flags.go:64] FLAG: --kube-api-burst="0" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018401 1 flags.go:64] FLAG: --kube-api-qps="0" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018409 1 flags.go:64] FLAG: --kubeconfig="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018411 1 flags.go:64] FLAG: --log-backtrace-at="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018414 1 flags.go:64] FLAG: --log-dir="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018443 1 flags.go:64] FLAG: --log-file="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018448 1 flags.go:64] FLAG: --log-file-max-size="0" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018452 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018457 1 flags.go:64] FLAG: --logtostderr="true" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018460 1 flags.go:64] FLAG: --oidc-ca-file="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018467 1 flags.go:64] FLAG: --oidc-clientID="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018471 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018475 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018478 1 flags.go:64] FLAG: --oidc-issuer="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018482 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018490 1 flags.go:64] FLAG: --oidc-username-claim="email" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018493 1 flags.go:64] FLAG: --oidc-username-prefix="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018497 1 flags.go:64] FLAG: --one-output="false" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018500 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018508 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:8443" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018512 1 flags.go:64] FLAG: --skip-headers="false" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018515 1 flags.go:64] FLAG: --skip-log-headers="false" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018518 1 flags.go:64] FLAG: --stderrthreshold="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018522 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018526 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018534 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018538 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018545 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018551 1 flags.go:64] FLAG: --upstream="http://localhost:8080/" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018554 1 flags.go:64] FLAG: --upstream-ca-file="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018556 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018559 1 flags.go:64] FLAG: --upstream-client-key-file="" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018562 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018565 1 flags.go:64] FLAG: --v="10" 2025-12-05T10:41:04.018573230Z I1205 10:41:04.018568 1 flags.go:64] FLAG: --version="false" 2025-12-05T10:41:04.018616391Z I1205 10:41:04.018572 1 flags.go:64] FLAG: --vmodule="" 2025-12-05T10:41:04.018616391Z W1205 10:41:04.018581 1 deprecated.go:66] 2025-12-05T10:41:04.018616391Z ==== Removed Flag Warning ====================== 2025-12-05T10:41:04.018616391Z 2025-12-05T10:41:04.018616391Z logtostderr is removed in the k8s upstream and has no effect any more. 2025-12-05T10:41:04.018616391Z 2025-12-05T10:41:04.018616391Z =============================================== 2025-12-05T10:41:04.018616391Z 2025-12-05T10:41:04.018616391Z I1205 10:41:04.018592 1 kube-rbac-proxy.go:530] Reading config file: /etc/baremetal-kube-rbac-proxy/config-file.yaml 2025-12-05T10:41:04.019533404Z I1205 10:41:04.019501 1 kube-rbac-proxy.go:233] Valid token audiences: 2025-12-05T10:41:04.021078524Z I1205 10:41:04.021026 1 kube-rbac-proxy.go:347] Reading certificate files 2025-12-05T10:41:04.021224508Z I1205 10:41:04.021206 1 reloader.go:99] reloading key /etc/tls/private/tls.key certificate /etc/tls/private/tls.crt 2025-12-05T10:41:04.021411093Z I1205 10:41:04.021384 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2025-12-05T10:41:04.021700080Z I1205 10:41:04.021678 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 cluster-baremetal-operator_current.log0000640000000000000000000001323415114533341035574 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-baremetal-operator-78f758c7b9-6t2gm2025-12-05T10:41:03.849160508Z I1205 10:41:03.848827 1 webhook.go:104] WebhookDependenciesReady: everything ready for webhooks 2025-12-05T10:41:03.885112503Z I1205 10:41:03.884896 1 clusteroperator.go:235] "new CO status" reason="WaitingForProvisioningCR" processMessage="" message="Waiting for Provisioning CR on BareMetal Platform" 2025-12-05T10:41:03.977785880Z I1205 10:41:03.977581 1 provisioning_controller.go:651] "Network stack calculation" NetworkStack=1 2025-12-05T10:41:03.995756542Z I1205 10:41:03.995694 1 recorder_logging.go:44] &Event{ObjectMeta:{dummy.187e4ba233706b74 dummy 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:dummy,Name:dummy,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ValidatingWebhookConfigurationCreated,Message:Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cluster-baremetal-validating-webhook-configuration because it was missing,Source:EventSource{Component:,Host:,},FirstTimestamp:2025-12-05 10:41:03.995603828 +0000 UTC m=+0.238930533,LastTimestamp:2025-12-05 10:41:03.995603828 +0000 UTC m=+0.238930533,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,} 2025-12-05T10:41:03.995877135Z I1205 10:41:03.995831 1 webhook.go:177] "msg"="skip registering a mutating webhook, object does not implement admission.Defaulter or WithDefaulter wasn't called" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" 2025-12-05T10:41:03.995886566Z I1205 10:41:03.995876 1 webhook.go:193] "msg"="Registering a validating webhook" "GVK"={"Group":"metal3.io","Version":"v1alpha1","Kind":"Provisioning"} "logger"="controller-runtime.builder" "path"="/validate-metal3-io-v1alpha1-provisioning" 2025-12-05T10:41:03.996272136Z I1205 10:41:03.995959 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-metal3-io-v1alpha1-provisioning" 2025-12-05T10:41:03.996272136Z I1205 10:41:03.996020 1 main.go:180] starting manager 2025-12-05T10:41:03.997770154Z I1205 10:41:03.997736 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2025-12-05T10:41:03.998148434Z I1205 10:41:03.998117 1 server.go:247] "msg"="Serving metrics server" "bindAddress"=":8080" "logger"="controller-runtime.metrics" "secure"=false 2025-12-05T10:41:03.998252166Z I1205 10:41:03.998222 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2025-12-05T10:41:03.998959675Z I1205 10:41:03.998729 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2025-12-05T10:41:03.998959675Z I1205 10:41:03.998863 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=9443 2025-12-05T10:41:03.999163140Z I1205 10:41:03.999123 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2025-12-05T10:41:04.099770741Z I1205 10:41:04.099715 1 leaderelection.go:250] attempting to acquire leader lease openshift-machine-api/cluster-baremetal-operator... 2025-12-05T10:41:04.348075314Z I1205 10:41:04.345938 1 leaderelection.go:260] successfully acquired lease openshift-machine-api/cluster-baremetal-operator 2025-12-05T10:41:04.348075314Z I1205 10:41:04.346491 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1alpha1.Provisioning" 2025-12-05T10:41:04.348075314Z I1205 10:41:04.346517 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Secret" 2025-12-05T10:41:04.348075314Z I1205 10:41:04.346536 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Deployment" 2025-12-05T10:41:04.348075314Z I1205 10:41:04.346552 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Service" 2025-12-05T10:41:04.348075314Z I1205 10:41:04.346567 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.DaemonSet" 2025-12-05T10:41:04.348075314Z I1205 10:41:04.346582 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.ClusterOperator" 2025-12-05T10:41:04.348075314Z I1205 10:41:04.346597 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1.Proxy" 2025-12-05T10:41:04.348075314Z I1205 10:41:04.346612 1 controller.go:173] "msg"="Starting EventSource" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "source"="kind source: *v1beta1.Machine" 2025-12-05T10:41:04.348075314Z I1205 10:41:04.346625 1 controller.go:181] "msg"="Starting Controller" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" 2025-12-05T10:41:04.578476667Z I1205 10:41:04.577415 1 controller.go:215] "msg"="Starting workers" "controller"="provisioning" "controllerGroup"="metal3.io" "controllerKind"="Provisioning" "worker count"=1 cluster-autoscaler-operator_current.log0000640000000000000000000002101715114533341036310 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-5f49d774cd-cfg5f2025-12-05T10:41:03.712669603Z I1205 10:41:03.712490 1 main.go:15] Go Version: go1.22.12 (Red Hat 1.22.12-3.el9_5) X:strictfipsruntime 2025-12-05T10:41:03.712669603Z I1205 10:41:03.712611 1 main.go:16] Go OS/Arch: linux/amd64 2025-12-05T10:41:03.712669603Z I1205 10:41:03.712616 1 main.go:17] Version: cluster-autoscaler-operator v4.18.0-202511181540.p2.g474ad65.assembly.stream.el9+ose-cluster-autoscaler-operator 2025-12-05T10:41:03.712820367Z I1205 10:41:03.712795 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-05T10:41:03.728698836Z I1205 10:41:03.728602 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-clusterautoscalers" 2025-12-05T10:41:03.729644860Z I1205 10:41:03.728810 1 server.go:183] "msg"="Registering webhook" "logger"="controller-runtime.webhook" "path"="/validate-machineautoscalers" 2025-12-05T10:41:03.729644860Z I1205 10:41:03.729036 1 main.go:41] Starting cluster-autoscaler-operator 2025-12-05T10:41:03.729644860Z I1205 10:41:03.729273 1 server.go:208] "msg"="Starting metrics server" "logger"="controller-runtime.metrics" 2025-12-05T10:41:03.729644860Z I1205 10:41:03.729407 1 server.go:191] "msg"="Starting webhook server" "logger"="controller-runtime.webhook" 2025-12-05T10:41:03.729644860Z I1205 10:41:03.729546 1 leaderelection.go:254] attempting to acquire leader lease openshift-machine-api/cluster-autoscaler-operator-leader... 2025-12-05T10:41:03.729778813Z I1205 10:41:03.729757 1 certwatcher.go:161] "msg"="Updated current TLS certificate" "logger"="controller-runtime.certwatcher" 2025-12-05T10:41:03.730042871Z I1205 10:41:03.730027 1 server.go:242] "msg"="Serving webhook server" "host"="" "logger"="controller-runtime.webhook" "port"=8443 2025-12-05T10:41:03.730121753Z I1205 10:41:03.730100 1 server.go:247] "msg"="Serving metrics server" "bindAddress"="127.0.0.1:9191" "logger"="controller-runtime.metrics" "secure"=false 2025-12-05T10:41:03.730162494Z I1205 10:41:03.730145 1 certwatcher.go:115] "msg"="Starting certificate watcher" "logger"="controller-runtime.certwatcher" 2025-12-05T10:41:03.759372196Z I1205 10:41:03.758915 1 leaderelection.go:268] successfully acquired lease openshift-machine-api/cluster-autoscaler-operator-leader 2025-12-05T10:41:03.759372196Z I1205 10:41:03.759277 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.ClusterAutoscaler" 2025-12-05T10:41:03.759372196Z I1205 10:41:03.759294 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.Deployment" 2025-12-05T10:41:03.759372196Z I1205 10:41:03.759321 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.Service" 2025-12-05T10:41:03.759372196Z I1205 10:41:03.759332 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.ServiceMonitor" 2025-12-05T10:41:03.759372196Z I1205 10:41:03.759342 1 controller.go:175] "msg"="Starting EventSource" "controller"="cluster_autoscaler_controller" "source"="kind source: *v1.PrometheusRule" 2025-12-05T10:41:03.759372196Z I1205 10:41:03.759349 1 controller.go:183] "msg"="Starting Controller" "controller"="cluster_autoscaler_controller" 2025-12-05T10:41:03.763522583Z I1205 10:41:03.760009 1 controller.go:175] "msg"="Starting EventSource" "controller"="machine_autoscaler_controller" "source"="kind source: *v1beta1.MachineAutoscaler" 2025-12-05T10:41:03.763522583Z I1205 10:41:03.760028 1 controller.go:175] "msg"="Starting EventSource" "controller"="machine_autoscaler_controller" "source"="kind source: *unstructured.Unstructured" 2025-12-05T10:41:03.763522583Z I1205 10:41:03.760035 1 controller.go:183] "msg"="Starting Controller" "controller"="machine_autoscaler_controller" 2025-12-05T10:41:03.763522583Z I1205 10:41:03.760183 1 status.go:341] Starting status reporter: cluster operator informers 2025-12-05T10:41:03.860810997Z I1205 10:41:03.860575 1 status.go:352] Starting status reporter: worker 2025-12-05T10:41:03.870730473Z I1205 10:41:03.870280 1 status.go:437] machine-api-operator not ready yet 2025-12-05T10:41:03.870730473Z W1205 10:41:03.870301 1 status.go:271] Operator status degraded: machine-api not ready 2025-12-05T10:41:03.894350521Z I1205 10:41:03.894294 1 controller.go:217] "msg"="Starting workers" "controller"="machine_autoscaler_controller" "worker count"=1 2025-12-05T10:41:03.897699487Z I1205 10:41:03.897653 1 controller.go:217] "msg"="Starting workers" "controller"="cluster_autoscaler_controller" "worker count"=1 2025-12-05T10:41:03.947687974Z I1205 10:41:03.946770 1 webhookconfig.go:72] Webhook configuration status: created 2025-12-05T10:41:03.979590656Z I1205 10:41:03.978547 1 status.go:437] machine-api-operator not ready yet 2025-12-05T10:41:03.979590656Z W1205 10:41:03.978564 1 status.go:271] Operator status degraded: machine-api not ready 2025-12-05T10:41:03.989806549Z I1205 10:41:03.989749 1 status.go:437] machine-api-operator not ready yet 2025-12-05T10:41:03.989806549Z W1205 10:41:03.989769 1 status.go:271] Operator status degraded: machine-api not ready 2025-12-05T10:41:04.372025430Z I1205 10:41:04.371957 1 status.go:437] machine-api-operator not ready yet 2025-12-05T10:41:04.372025430Z W1205 10:41:04.371991 1 status.go:271] Operator status degraded: machine-api not ready 2025-12-05T10:41:04.388878124Z I1205 10:41:04.388819 1 status.go:437] machine-api-operator not ready yet 2025-12-05T10:41:04.388878124Z W1205 10:41:04.388842 1 status.go:271] Operator status degraded: machine-api not ready 2025-12-05T10:41:04.402589918Z I1205 10:41:04.402540 1 status.go:437] machine-api-operator not ready yet 2025-12-05T10:41:04.402589918Z W1205 10:41:04.402564 1 status.go:271] Operator status degraded: machine-api not ready 2025-12-05T10:41:04.434633263Z I1205 10:41:04.432353 1 status.go:450] No ClusterAutoscaler. Reporting available. 2025-12-05T10:41:04.434633263Z I1205 10:41:04.432377 1 status.go:244] Operator status available: at version 4.18.29 2025-12-05T10:41:04.499549424Z I1205 10:41:04.499031 1 status.go:450] No ClusterAutoscaler. Reporting available. 2025-12-05T10:41:04.499549424Z I1205 10:41:04.499056 1 status.go:244] Operator status available: at version 4.18.29 2025-12-05T10:41:04.527542275Z I1205 10:41:04.522563 1 status.go:450] No ClusterAutoscaler. Reporting available. 2025-12-05T10:41:04.527542275Z I1205 10:41:04.522591 1 status.go:244] Operator status available: at version 4.18.29 2025-12-05T10:41:04.580898668Z I1205 10:41:04.580826 1 status.go:450] No ClusterAutoscaler. Reporting available. 2025-12-05T10:41:04.580898668Z I1205 10:41:04.580850 1 status.go:244] Operator status available: at version 4.18.29 2025-12-05T10:41:04.632767614Z I1205 10:41:04.629490 1 status.go:450] No ClusterAutoscaler. Reporting available. 2025-12-05T10:41:04.632767614Z I1205 10:41:04.629513 1 status.go:244] Operator status available: at version 4.18.29 2025-12-05T10:41:04.709653944Z I1205 10:41:04.706781 1 status.go:450] No ClusterAutoscaler. Reporting available. 2025-12-05T10:41:04.709653944Z I1205 10:41:04.706804 1 status.go:244] Operator status available: at version 4.18.29 2025-12-05T10:41:04.746621206Z I1205 10:41:04.746533 1 status.go:450] No ClusterAutoscaler. Reporting available. 2025-12-05T10:41:04.746621206Z I1205 10:41:04.746557 1 status.go:244] Operator status available: at version 4.18.29 2025-12-05T10:41:04.917045624Z I1205 10:41:04.916976 1 status.go:450] No ClusterAutoscaler. Reporting available. 2025-12-05T10:41:04.917045624Z I1205 10:41:04.917005 1 status.go:244] Operator status available: at version 4.18.29 2025-12-05T10:41:04.953966865Z I1205 10:41:04.953862 1 status.go:450] No ClusterAutoscaler. Reporting available. 2025-12-05T10:41:04.953966865Z I1205 10:41:04.953887 1 status.go:244] Operator status available: at version 4.18.29 2025-12-05T10:41:04.961587081Z I1205 10:41:04.961532 1 status.go:450] No ClusterAutoscaler. Reporting available. 2025-12-05T10:41:04.961587081Z I1205 10:41:04.961550 1 status.go:244] Operator status available: at version 4.18.29 kube-rbac-proxy_current.log0000640000000000000000000001524715114533341033660 0ustar0000000000000000config/pod/openshift-machine-api/logs/cluster-autoscaler-operator-5f49d774cd-cfg5f2025-12-05T10:40:49.556270165Z I1205 10:40:49.556092 1 flags.go:64] FLAG: --add-dir-header="false" 2025-12-05T10:40:49.556270165Z I1205 10:40:49.556214 1 flags.go:64] FLAG: --allow-paths="[]" 2025-12-05T10:40:49.556270165Z I1205 10:40:49.556221 1 flags.go:64] FLAG: --alsologtostderr="false" 2025-12-05T10:40:49.556270165Z I1205 10:40:49.556225 1 flags.go:64] FLAG: --auth-header-fields-enabled="false" 2025-12-05T10:40:49.556270165Z I1205 10:40:49.556234 1 flags.go:64] FLAG: --auth-header-groups-field-name="x-remote-groups" 2025-12-05T10:40:49.556270165Z I1205 10:40:49.556245 1 flags.go:64] FLAG: --auth-header-groups-field-separator="|" 2025-12-05T10:40:49.556270165Z I1205 10:40:49.556249 1 flags.go:64] FLAG: --auth-header-user-field-name="x-remote-user" 2025-12-05T10:40:49.556270165Z I1205 10:40:49.556252 1 flags.go:64] FLAG: --auth-token-audiences="[]" 2025-12-05T10:40:49.556270165Z I1205 10:40:49.556257 1 flags.go:64] FLAG: --client-ca-file="" 2025-12-05T10:40:49.556270165Z I1205 10:40:49.556260 1 flags.go:64] FLAG: --config-file="/etc/kube-rbac-proxy/config-file.yaml" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556264 1 flags.go:64] FLAG: --help="false" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556269 1 flags.go:64] FLAG: --http2-disable="false" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556273 1 flags.go:64] FLAG: --http2-max-concurrent-streams="100" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556278 1 flags.go:64] FLAG: --http2-max-size="262144" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556281 1 flags.go:64] FLAG: --ignore-paths="[]" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556286 1 flags.go:64] FLAG: --insecure-listen-address="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556289 1 flags.go:64] FLAG: --kube-api-burst="0" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556293 1 flags.go:64] FLAG: --kube-api-qps="0" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556297 1 flags.go:64] FLAG: --kubeconfig="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556299 1 flags.go:64] FLAG: --log-backtrace-at="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556302 1 flags.go:64] FLAG: --log-dir="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556305 1 flags.go:64] FLAG: --log-file="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556308 1 flags.go:64] FLAG: --log-file-max-size="0" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556312 1 flags.go:64] FLAG: --log-flush-frequency="5s" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556316 1 flags.go:64] FLAG: --logtostderr="true" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556319 1 flags.go:64] FLAG: --oidc-ca-file="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556321 1 flags.go:64] FLAG: --oidc-clientID="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556324 1 flags.go:64] FLAG: --oidc-groups-claim="groups" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556327 1 flags.go:64] FLAG: --oidc-groups-prefix="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556329 1 flags.go:64] FLAG: --oidc-issuer="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556332 1 flags.go:64] FLAG: --oidc-sign-alg="[RS256]" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556336 1 flags.go:64] FLAG: --oidc-username-claim="email" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556339 1 flags.go:64] FLAG: --oidc-username-prefix="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556342 1 flags.go:64] FLAG: --one-output="false" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556345 1 flags.go:64] FLAG: --proxy-endpoints-port="0" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556348 1 flags.go:64] FLAG: --secure-listen-address="0.0.0.0:9192" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556351 1 flags.go:64] FLAG: --skip-headers="false" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556353 1 flags.go:64] FLAG: --skip-log-headers="false" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556356 1 flags.go:64] FLAG: --stderrthreshold="" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556359 1 flags.go:64] FLAG: --tls-cert-file="/etc/tls/private/tls.crt" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556363 1 flags.go:64] FLAG: --tls-cipher-suites="[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305]" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556371 1 flags.go:64] FLAG: --tls-min-version="VersionTLS12" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556374 1 flags.go:64] FLAG: --tls-private-key-file="/etc/tls/private/tls.key" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556377 1 flags.go:64] FLAG: --tls-reload-interval="1m0s" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556381 1 flags.go:64] FLAG: --upstream="http://127.0.0.1:9191/" 2025-12-05T10:40:49.556392088Z I1205 10:40:49.556385 1 flags.go:64] FLAG: --upstream-ca-file="" 2025-12-05T10:40:49.556454909Z I1205 10:40:49.556389 1 flags.go:64] FLAG: --upstream-client-cert-file="" 2025-12-05T10:40:49.556454909Z I1205 10:40:49.556393 1 flags.go:64] FLAG: --upstream-client-key-file="" 2025-12-05T10:40:49.556454909Z I1205 10:40:49.556397 1 flags.go:64] FLAG: --upstream-force-h2c="false" 2025-12-05T10:40:49.556454909Z I1205 10:40:49.556400 1 flags.go:64] FLAG: --v="3" 2025-12-05T10:40:49.556454909Z I1205 10:40:49.556404 1 flags.go:64] FLAG: --version="false" 2025-12-05T10:40:49.556454909Z I1205 10:40:49.556409 1 flags.go:64] FLAG: --vmodule="" 2025-12-05T10:40:49.556472070Z W1205 10:40:49.556463 1 deprecated.go:66] 2025-12-05T10:40:49.556472070Z ==== Removed Flag Warning ====================== 2025-12-05T10:40:49.556472070Z 2025-12-05T10:40:49.556472070Z logtostderr is removed in the k8s upstream and has no effect any more. 2025-12-05T10:40:49.556472070Z 2025-12-05T10:40:49.556472070Z =============================================== 2025-12-05T10:40:49.556472070Z 2025-12-05T10:40:49.556483780Z I1205 10:40:49.556476 1 kube-rbac-proxy.go:530] Reading config file: /etc/kube-rbac-proxy/config-file.yaml 2025-12-05T10:40:49.557041484Z I1205 10:40:49.557011 1 kube-rbac-proxy.go:233] Valid token audiences: 2025-12-05T10:40:49.558230015Z I1205 10:40:49.558196 1 kube-rbac-proxy.go:347] Reading certificate files 2025-12-05T10:40:49.558541873Z I1205 10:40:49.558501 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:9192 2025-12-05T10:40:49.558841850Z I1205 10:40:49.558815 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:9192 config/pod/openshift-oauth-apiserver/logs/apiserver-85b8f855df-8g52w/oauth-apiserver_current.log0000640000000000000000000011276515114533341031225 0ustar00000000000000002025-12-05T10:39:32.282047893Z E1205 10:39:32.280116 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:32.282047893Z E1205 10:39:32.279918 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:32.282047893Z E1205 10:39:32.280536 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:32.367453917Z E1205 10:39:32.367399 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:32.373774323Z E1205 10:39:32.373734 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:32.373801414Z E1205 10:39:32.373776 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:32.378482366Z E1205 10:39:32.378442 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:36.351929682Z W1205 10:39:36.328797 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:38.847377210Z W1205 10:39:38.847231 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:40.088940474Z W1205 10:39:40.088817 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:40.096029539Z W1205 10:39:40.095883 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:40.982338080Z W1205 10:39:40.982237 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:42.090365012Z E1205 10:39:42.090240 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:42.090472725Z E1205 10:39:42.090358 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:42.090728482Z E1205 10:39:42.090465 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:42.091123082Z E1205 10:39:42.091070 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:42.091131512Z E1205 10:39:42.091108 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:42.120984172Z E1205 10:39:42.120860 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:42.121050674Z E1205 10:39:42.120982 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:42.121050674Z E1205 10:39:42.121006 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:42.121302311Z E1205 10:39:42.120864 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:42.121302311Z E1205 10:39:42.121263 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:39:42.332298490Z W1205 10:39:42.332122 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:43.680159759Z W1205 10:39:43.680101 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:44.066263541Z W1205 10:39:44.066172 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:46.527864124Z W1205 10:39:46.527769 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:46.702890910Z W1205 10:39:46.702785 1 logging.go:55] [core] [Channel #17 SubChannel #18]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:51.281290128Z W1205 10:39:51.281209 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:52.282349774Z W1205 10:39:52.282247 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:53.832242622Z W1205 10:39:53.832121 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:56.193500151Z W1205 10:39:56.193390 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:39:59.755146379Z W1205 10:39:59.755046 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2025-12-05T10:40:02.257545692Z E1205 10:40:02.257494 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:02.257628295Z E1205 10:40:02.257601 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:02.257837700Z E1205 10:40:02.257781 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:02.257935932Z E1205 10:40:02.257906 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:02.258042906Z E1205 10:40:02.258020 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:02.258180499Z E1205 10:40:02.258158 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:02.258264211Z E1205 10:40:02.258243 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:02.258466987Z E1205 10:40:02.258397 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:02.258494137Z E1205 10:40:02.258479 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:02.258634631Z E1205 10:40:02.258403 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:12.099564502Z E1205 10:40:12.099481 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:12.100009684Z E1205 10:40:12.099972 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:12.100305881Z E1205 10:40:12.100238 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:12.100596158Z E1205 10:40:12.100548 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:12.100919637Z E1205 10:40:12.100861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:12.125046679Z E1205 10:40:12.124950 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:12.125046679Z E1205 10:40:12.124999 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:12.125119500Z E1205 10:40:12.125045 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:12.125119500Z E1205 10:40:12.124953 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:12.125236243Z E1205 10:40:12.125136 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.258544430Z E1205 10:40:32.255536 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.258544430Z E1205 10:40:32.255851 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.258544430Z E1205 10:40:32.256006 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.258544430Z E1205 10:40:32.256150 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.258544430Z E1205 10:40:32.256345 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.266616718Z E1205 10:40:32.266554 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.267697196Z E1205 10:40:32.266731 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.267697196Z E1205 10:40:32.266886 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.267697196Z E1205 10:40:32.267055 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.267697196Z E1205 10:40:32.267134 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.285979386Z E1205 10:40:32.285252 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.297951364Z E1205 10:40:32.297861 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.308714222Z E1205 10:40:32.308645 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.316637616Z E1205 10:40:32.316577 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.345795237Z E1205 10:40:32.345734 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.351064622Z E1205 10:40:32.351027 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.372388822Z E1205 10:40:32.372345 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:32.379531056Z E1205 10:40:32.379076 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:42.108023022Z E1205 10:40:42.107934 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:42.108023022Z E1205 10:40:42.107960 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:42.108350930Z E1205 10:40:42.108317 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:42.109084149Z E1205 10:40:42.109041 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:42.133646901Z E1205 10:40:42.133570 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:42.133646901Z E1205 10:40:42.133588 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:42.133707403Z E1205 10:40:42.133649 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:42.133707403Z E1205 10:40:42.133692 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:42.133900048Z E1205 10:40:42.133863 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:43.114876907Z E1205 10:40:43.114785 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:40:53.239119263Z I1205 10:40:53.239034 1 policy_source.go:224] refreshing policies 2025-12-05T10:41:02.271919425Z E1205 10:41:02.269448 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.271919425Z E1205 10:41:02.269526 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.271919425Z E1205 10:41:02.269603 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.271919425Z E1205 10:41:02.269659 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.271919425Z E1205 10:41:02.269715 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.283608937Z E1205 10:41:02.283558 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.283716610Z E1205 10:41:02.283692 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.283804842Z E1205 10:41:02.283768 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.284009267Z E1205 10:41:02.283980 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:02.284067978Z E1205 10:41:02.284052 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:07.254443789Z I1205 10:41:07.254370 1 policy_source.go:224] refreshing policies 2025-12-05T10:41:08.262603258Z I1205 10:41:08.262550 1 policy_source.go:224] refreshing policies 2025-12-05T10:41:08.282647094Z I1205 10:41:08.282575 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2025-12-05T10:41:08.284014159Z I1205 10:41:08.283988 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2025-12-05T10:41:12.140801177Z E1205 10:41:12.140740 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:12.140801177Z E1205 10:41:12.140766 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:12.140801177Z E1205 10:41:12.140778 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:12.140895489Z E1205 10:41:12.140740 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" 2025-12-05T10:41:12.141033793Z E1205 10:41:12.141010 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=4678051323914340649, SKID=11:A7:DF:AE:AC:89:9D:6E:3D:CB:00:DF:B7:BF:2B:55:01:4B:2F:06, AKID=55:51:02:6F:58:1B:FF:07:69:8E:41:A6:C9:87:55:C7:22:27:A5:5A failed: x509: certificate signed by unknown authority]" config/pod/openshift-ingress/router-default-5465c8b4db-s4c2f.json0000640000000000000000000001534115114533341023106 0ustar0000000000000000{"metadata":{"name":"router-default-5465c8b4db-s4c2f","generateName":"router-default-5465c8b4db-","namespace":"openshift-ingress","uid":"445d75af-d072-4fa0-91a7-f3fa579b9ca9","resourceVersion":"5950","creationTimestamp":"2025-12-05T10:37:58Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"85fc95cf79","pod-template-hash":"5465c8b4db"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-5465c8b4db","uid":"f736517e-aed5-4d8a-a701-fe653ef8c620","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-hskm2","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-hskm2","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["85fc95cf79"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:58Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003062015114533341037535 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-6c968fdfdf-t7sl82025-12-05T10:39:41.668382704Z Copying system trust bundle 2025-12-05T10:39:41.732950083Z W1205 10:39:41.732819 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2025-12-05T10:39:41.733122777Z I1205 10:39:41.733075 1 observer_polling.go:159] Starting file observer 2025-12-05T10:39:41.733557019Z I1205 10:39:41.733515 1 cmd.go:253] Using service-serving-cert provided certificates 2025-12-05T10:39:41.733595770Z I1205 10:39:41.733561 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2025-12-05T10:39:41.734100003Z I1205 10:39:41.733990 1 observer_polling.go:159] Starting file observer 2025-12-05T10:40:26.960392389Z I1205 10:40:26.957955 1 builder.go:304] cluster-authentication-operator version - 2025-12-05T10:40:26.960392389Z I1205 10:40:26.959336 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-05T10:40:28.797525603Z I1205 10:40:28.797377 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2025-12-05T10:40:28.812150790Z I1205 10:40:28.811960 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2025-12-05T10:40:28.812150790Z I1205 10:40:28.811997 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2025-12-05T10:40:28.812150790Z I1205 10:40:28.812029 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2025-12-05T10:40:28.812150790Z I1205 10:40:28.812040 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2025-12-05T10:40:28.831771555Z I1205 10:40:28.831683 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2025-12-05T10:40:28.833607712Z I1205 10:40:28.831967 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2025-12-05T10:40:28.836381644Z I1205 10:40:28.836334 1 secure_serving.go:57] Forcing use of http/1.1 only 2025-12-05T10:40:28.836402384Z W1205 10:40:28.836379 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:40:28.836402384Z W1205 10:40:28.836388 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2025-12-05T10:40:28.836402384Z W1205 10:40:28.836397 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2025-12-05T10:40:28.836415164Z W1205 10:40:28.836405 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2025-12-05T10:40:28.836415164Z W1205 10:40:28.836411 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2025-12-05T10:40:28.836449255Z W1205 10:40:28.836417 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2025-12-05T10:40:28.836605869Z I1205 10:40:28.836552 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2025-12-05T10:40:28.847501850Z I1205 10:40:28.845859 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764931058\" (2025-12-05 10:37:42 +0000 UTC to 2027-12-05 10:37:43 +0000 UTC (now=2025-12-05 10:40:28.845820067 +0000 UTC))" 2025-12-05T10:40:28.847501850Z I1205 10:40:28.845973 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764931227\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764931227\" (2025-12-05 09:40:26 +0000 UTC to 2026-12-05 09:40:26 +0000 UTC (now=2025-12-05 10:40:28.845958 +0000 UTC))" 2025-12-05T10:40:28.847501850Z I1205 10:40:28.845988 1 secure_serving.go:213] Serving securely on [::]:8443 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846006 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846025 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846054 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846082 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846196 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846317 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846326 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846339 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846345 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846503 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2025-12-05T10:40:28.847501850Z I1205 10:40:28.846514 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2025-12-05T10:40:28.860581086Z I1205 10:40:28.856591 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2025-12-05T10:40:28.860581086Z I1205 10:40:28.857049 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2025-12-05T10:40:28.860581086Z I1205 10:40:28.857605 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2025-12-05T10:40:28.946783216Z I1205 10:40:28.946708 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2025-12-05T10:40:28.946783216Z I1205 10:40:28.946767 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2025-12-05T10:40:28.946823727Z I1205 10:40:28.946763 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2025-12-05T10:40:28.946979901Z I1205 10:40:28.946949 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-05 10:27:23 +0000 UTC to 2025-12-06 10:27:23 +0000 UTC (now=2025-12-05 10:40:28.9469243 +0000 UTC))" 2025-12-05T10:40:28.947115765Z I1205 10:40:28.947088 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764931058\" (2025-12-05 10:37:42 +0000 UTC to 2027-12-05 10:37:43 +0000 UTC (now=2025-12-05 10:40:28.947074854 +0000 UTC))" 2025-12-05T10:40:28.947877975Z I1205 10:40:28.947830 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764931227\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764931227\" (2025-12-05 09:40:26 +0000 UTC to 2026-12-05 09:40:26 +0000 UTC (now=2025-12-05 10:40:28.947812743 +0000 UTC))" 2025-12-05T10:40:28.947997978Z I1205 10:40:28.947963 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-12-05 10:20:50 +0000 UTC to 2035-12-03 10:20:50 +0000 UTC (now=2025-12-05 10:40:28.947951007 +0000 UTC))" 2025-12-05T10:40:28.947997978Z I1205 10:40:28.947985 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2025-12-06 10:27:25 +0000 UTC (now=2025-12-05 10:40:28.947976227 +0000 UTC))" 2025-12-05T10:40:28.948009368Z I1205 10:40:28.948003 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2026-12-05 10:27:25 +0000 UTC (now=2025-12-05 10:40:28.947995338 +0000 UTC))" 2025-12-05T10:40:28.948031749Z I1205 10:40:28.948016 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2025-12-05 10:27:25 +0000 UTC to 2026-12-05 10:27:25 +0000 UTC (now=2025-12-05 10:40:28.948008468 +0000 UTC))" 2025-12-05T10:40:28.948039289Z I1205 10:40:28.948032 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-12-05 10:27:22 +0000 UTC to 2035-12-03 10:27:22 +0000 UTC (now=2025-12-05 10:40:28.948021728 +0000 UTC))" 2025-12-05T10:40:28.954727771Z I1205 10:40:28.954641 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2025-12-05 10:27:23 +0000 UTC to 2025-12-06 10:27:23 +0000 UTC (now=2025-12-05 10:40:28.949931237 +0000 UTC))" 2025-12-05T10:40:28.954930126Z I1205 10:40:28.954899 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1764931058\" (2025-12-05 10:37:42 +0000 UTC to 2027-12-05 10:37:43 +0000 UTC (now=2025-12-05 10:40:28.954877075 +0000 UTC))" 2025-12-05T10:40:28.955112631Z I1205 10:40:28.955085 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1764931227\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1764931227\" (2025-12-05 09:40:26 +0000 UTC to 2026-12-05 09:40:26 +0000 UTC (now=2025-12-05 10:40:28.95506911 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000004462715114533341037743 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-6c968fdfdf-t7sl82025-12-05T10:39:07.467097812Z I1205 10:39:07.466518 1 base_controller.go:181] Shutting down WebhookAuthenticatorCertApprover_OpenShiftAuthenticator ... 2025-12-05T10:39:07.467097812Z E1205 10:39:07.466533 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock?timeout=4m0s": context canceled, falling back to slow path 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466559 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressNodesAvailable controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466570 1 base_controller.go:113] All openshift-authentication-IngressNodesAvailable workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466562 1 base_controller.go:113] All authentication-ManagementState workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466553 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorCertApprover_OpenShiftAuthenticator controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466583 1 base_controller.go:113] All WebhookAuthenticatorCertApprover_OpenShiftAuthenticator workers have been terminated 2025-12-05T10:39:07.467097812Z E1205 10:39:07.466631 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: client rate limiter Wait returned an error: context canceled 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466650 1 leaderelection.go:297] failed to renew lease openshift-authentication-operator/cluster-authentication-operator-lock: timed out waiting for the condition 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466667 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466690 1 base_controller.go:113] All ConfigObserver workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466692 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466691 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2025-12-05T10:39:07.467097812Z E1205 10:39:07.466701 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\": context canceled" 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466721 1 base_controller.go:123] Shutting down worker of oauth-server controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466730 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466784 1 base_controller.go:113] All oauth-server workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466710 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466796 1 base_controller.go:181] Shutting down openshift-authentication-IngressState ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466790 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466818 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionState ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466824 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1217976906/tls.crt::/tmp/serving-cert-1217976906/tls.key" 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466832 1 base_controller.go:113] All ConfigObserver workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466838 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionCondition ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466548 1 base_controller.go:123] Shutting down worker of StatusSyncer_authentication controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466849 1 base_controller.go:181] Shutting down RevisionController ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466858 1 base_controller.go:181] Shutting down SecretRevisionPruneController ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466862 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466872 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466876 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionState controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466886 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionState workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466889 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionCondition controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466786 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466901 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466911 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionCondition workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466831 1 base_controller.go:181] Shutting down OpenShiftAuthenticatorCertRequester ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466906 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466928 1 genericapiserver.go:640] [graceful-termination] in-flight non long-running request(s) have drained 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466870 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionMigration controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466937 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466894 1 base_controller.go:113] All StatusSyncer_authentication workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466809 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionMigration ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466957 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionMigration workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466914 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466960 1 genericapiserver.go:681] "[graceful-termination] shutdown event" name="InFlightRequestsDrained" 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466895 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466975 1 base_controller.go:113] All RevisionController workers have been terminated 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466974 1 base_controller.go:123] Shutting down worker of OpenShiftAuthenticatorCertRequester controller ... 2025-12-05T10:39:07.467097812Z I1205 10:39:07.466988 1 base_controller.go:181] Shutting down OAuthServerServiceEndpointsEndpointAccessibleController ... 2025-12-05T10:39:07.467097812Z E1205 10:39:07.467000 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.oauth.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467010 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointAccessibleController controller ... 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467015 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointsEndpointAccessibleController controller ... 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467019 1 secure_serving.go:258] Stopped listening on [::]:8443 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467021 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionPrune controller ... 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467026 1 base_controller.go:123] Shutting down worker of OAuthAPIServerController-WorkloadWorkloadController controller ... 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467019 1 base_controller.go:113] All OAuthServerServiceEndpointAccessibleController workers have been terminated 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467035 1 base_controller.go:113] All OAuthAPIServerController-WorkloadWorkloadController workers have been terminated 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467027 1 base_controller.go:113] All OAuthServerServiceEndpointsEndpointAccessibleController workers have been terminated 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467023 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionKey controller ... 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467047 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467038 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionPrune workers have been terminated 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467060 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionKey workers have been terminated 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467064 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2025-12-05T10:39:07.467191915Z I1205 10:39:07.467095 1 builder.go:335] server exited 2025-12-05T10:39:07.467191915Z I1205 10:39:07.466994 1 base_controller.go:113] All OpenShiftAuthenticatorCertRequester workers have been terminated 2025-12-05T10:39:07.467245086Z I1205 10:39:07.467231 1 base_controller.go:181] Shutting down TrustDistributionController ... 2025-12-05T10:39:07.468980561Z E1205 10:39:07.467332 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": context canceled" 2025-12-05T10:39:07.468980561Z W1205 10:39:07.467703 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": client rate limiter Wait returned an error: context canceled 2025-12-05T10:39:07.468980561Z E1205 10:39:07.467732 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/secrets/v4-0-config-system-router-certs\": context canceled" 2025-12-05T10:39:07.468980561Z I1205 10:39:07.467764 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-oauth-apiserver controller ... 2025-12-05T10:39:07.468980561Z I1205 10:39:07.467769 1 base_controller.go:113] All NamespaceFinalizerController_openshift-oauth-apiserver workers have been terminated 2025-12-05T10:39:07.468980561Z E1205 10:39:07.467826 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:39:07.468980561Z I1205 10:39:07.468240 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2025-12-05T10:39:07.468980561Z I1205 10:39:07.468251 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2025-12-05T10:39:07.468980561Z I1205 10:39:07.468460 1 base_controller.go:123] Shutting down worker of TrustDistributionController controller ... 2025-12-05T10:39:07.468980561Z I1205 10:39:07.468468 1 base_controller.go:113] All TrustDistributionController workers have been terminated 2025-12-05T10:39:07.469081485Z I1205 10:39:07.469057 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2025-12-05T10:39:07.469081485Z I1205 10:39:07.469072 1 base_controller.go:113] All auditPolicyController workers have been terminated 2025-12-05T10:39:07.469081485Z I1205 10:39:07.469060 1 base_controller.go:123] Shutting down worker of RouterCertsDomainValidationController controller ... 2025-12-05T10:39:07.469093335Z I1205 10:39:07.469082 1 base_controller.go:113] All RouterCertsDomainValidationController workers have been terminated 2025-12-05T10:39:07.469345382Z W1205 10:39:07.469315 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal 2025-12-05T10:39:07.469345382Z W1205 10:39:07.469328 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal 2025-12-05T10:39:07.469470825Z E1205 10:39:07.469440 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": client rate limiter Wait returned an error: context canceled" 2025-12-05T10:39:07.469752912Z E1205 10:39:07.469594 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": context canceled, \"oauth-openshift/oauth-service.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:39:07.470658816Z W1205 10:39:07.470404 1 base_controller.go:242] Updating status of "WebhookAuthenticatorController" failed: unable to ApplyStatus for operator using fieldManager "WebhookAuthenticatorController-reportDegraded": client rate limiter Wait returned an error: context canceled 2025-12-05T10:39:07.470658816Z E1205 10:39:07.470498 1 base_controller.go:279] "Unhandled Error" err="WebhookAuthenticatorController reconciliation failed: Get \"https://172.30.0.1:443/apis/config.openshift.io/v1/authentications/cluster\": context canceled" 2025-12-05T10:39:07.470658816Z I1205 10:39:07.470546 1 base_controller.go:123] Shutting down worker of openshift-authentication-ServiceCA controller ... 2025-12-05T10:39:07.470658816Z I1205 10:39:07.470561 1 base_controller.go:113] All openshift-authentication-ServiceCA workers have been terminated 2025-12-05T10:39:07.471782775Z I1205 10:39:07.471692 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorController controller ... 2025-12-05T10:39:07.471782775Z I1205 10:39:07.471710 1 base_controller.go:113] All WebhookAuthenticatorController workers have been terminated 2025-12-05T10:39:07.471782775Z I1205 10:39:07.471739 1 base_controller.go:123] Shutting down worker of OpenshiftAuthenticationStaticResources-StaticResources controller ... 2025-12-05T10:39:07.471782775Z I1205 10:39:07.471753 1 base_controller.go:113] All OpenshiftAuthenticationStaticResources-StaticResources workers have been terminated 2025-12-05T10:39:07.471943910Z E1205 10:39:07.471873 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-oauth-apiserver\": context canceled, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2025-12-05T10:39:07.473111939Z I1205 10:39:07.473037 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2025-12-05T10:39:07.473111939Z I1205 10:39:07.473056 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2025-12-05T10:39:12.465733610Z I1205 10:39:12.465661 1 observer_polling.go:162] Shutting down file observer 2025-12-05T10:39:37.613242142Z I1205 10:39:37.613115 1 cmd.go:141] Received SIGTERM or SIGINT signal, shutting down controller. 2025-12-05T10:39:41.473415865Z E1205 10:39:41.473337 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2025-12-05T10:39:41.473415865Z W1205 10:39:41.473385 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8.json0000640000000000000000000001610315114533341030426 0ustar0000000000000000{"metadata":{"name":"authentication-operator-6c968fdfdf-t7sl8","generateName":"authentication-operator-6c968fdfdf-","namespace":"openshift-authentication-operator","uid":"d95a56ba-c940-4e3e-aed6-d8c04f1871b6","resourceVersion":"8723","creationTimestamp":"2025-12-05T10:35:54Z","labels":{"app":"authentication-operator","pod-template-hash":"6c968fdfdf"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.23/23\"],\"mac_address\":\"0a:58:0a:80:00:17\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.23/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.23\"\n ],\n \"mac\": \"0a:58:0a:80:00:17\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-6c968fdfdf","uid":"8adc27b0-9315-47a6-a260-6378aeee6046","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-2fbss","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8860e00f858d1bca98344f21b5a5c4acc43c9c6eca8216582514021f0ab3cf7b"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.29"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.29_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-2fbss","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c14,c4"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:37Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:37Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.23","podIPs":[{"ip":"10.128.0.23"}],"startTime":"2025-12-05T10:37:08Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2025-12-05T10:39:41Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-05T10:37:36Z","finishedAt":"2025-12-05T10:39:41Z","containerID":"cri-o://dad5a560aae0ea7cbefd19607cf4263a0d5cfc63a06ebe4360483bee7047a720"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df","containerID":"cri-o://61e3c1e2bb3e972291fccf7fa16658ac2da0a3dc54e79b6f27f8a488bee5a098","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-2fbss","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000002607015114533341020641 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:32:09Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:32:21Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-67477646d4 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:32:23Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-7cd7dbb44c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:32:23Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-67477646d4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:32:23Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-7cd7dbb44c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:35:50Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:35:51Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-67477646d4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:35:51Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-7cd7dbb44c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:35:53Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-67477646d4-nm8cn","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:35:53Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:35:53Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:35:53Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-7cd7dbb44c-d25sk","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:08Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-67477646d4-nm8cn to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:08Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-7cd7dbb44c-d25sk to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:24Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:48Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:48Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:57Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:57Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:57Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:57Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.10/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:37:57Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9\" in 16.287s (16.287s including waiting). Image size: 857069957 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9\" in 16.131s (16.131s including waiting). Image size: 857069957 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:38:14Z","reason":"LeaderElection","message":"package-server-manager-67477646d4-nm8cn_a1665285-410f-4721-91fa-59460e820797 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:38:15Z","reason":"NoOperatorGroup","message":"csv in namespace with no operatorgroups","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:31Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:31Z","reason":"RequirementsUnknown","message":"InstallModes now support target namespaces","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:38Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:38Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:44Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-fbc6455c4 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:45Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-d7b67d8cf-krp6c","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:45Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-fbc6455c4-mbm77","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:45Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-d7b67d8cf to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.56/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2025-12-05T10:40:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.52/23] from ovn-kubernetes","type":"Normal"}]}events/openshift-apiserver.json0000640000000000000000000001343415114533341015441 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:49Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-7c8487d4d9 to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:49Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-7c8487d4d9-hsrsh to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:49Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-7c8487d4d9-hsrsh","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:53Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-7c8487d4d9-hsrsh","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:53Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-5b9fd577f8 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:53Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:53Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-7c8487d4d9 to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:53Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-5b9fd577f8-6sxcx","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:53Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:53Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:54Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-5b9fd577f8-6sxcx to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:37:56Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"serving-cert\" : secret \"serving-cert\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:01Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:01Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf\" in 11.778s (11.778s including waiting). Image size: 583836304 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:14Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:14Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:14Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:14Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:15Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:15Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:20Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2025-12-05T10:38:20Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000011263015114533341017270 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:32:07Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-7bf7f6b755 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:32:18Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-7bf7f6b755-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:35:52Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-7bf7f6b755-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:35:54Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:35:54Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-7bf7f6b755-hdjv7","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:08Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-7bf7f6b755-hdjv7 to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:09Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_openshift-apiserver-operator-7bf7f6b755-hdjv7_openshift-apiserver-operator_6f76d12f-5406-47e2-8337-2f50e35376d6_0(7de46553d19ad30ed71bffa56925d8e509ef195c379ab73448fece3f5873cffe): error adding pod openshift-apiserver-operator_openshift-apiserver-operator-7bf7f6b755-hdjv7 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"7de46553d19ad30ed71bffa56925d8e509ef195c379ab73448fece3f5873cffe\" Netns:\"/var/run/netns/895de962-b7a8-4b19-b798-ff7111d62b48\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-apiserver-operator;K8S_POD_NAME=openshift-apiserver-operator-7bf7f6b755-hdjv7;K8S_POD_INFRA_CONTAINER_ID=7de46553d19ad30ed71bffa56925d8e509ef195c379ab73448fece3f5873cffe;K8S_POD_UID=6f76d12f-5406-47e2-8337-2f50e35376d6\" Path:\"\" ERRORED: error configuring pod [openshift-apiserver-operator/openshift-apiserver-operator-7bf7f6b755-hdjv7] networking: [openshift-apiserver-operator/openshift-apiserver-operator-7bf7f6b755-hdjv7/6f76d12f-5406-47e2-8337-2f50e35376d6:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:14Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_openshift-apiserver-operator-7bf7f6b755-hdjv7_openshift-apiserver-operator_6f76d12f-5406-47e2-8337-2f50e35376d6_0(23a473da2dce1515b2a06d3b42516c4a6eb5d0c47812c1f3ff01059c2135c99c): error adding pod openshift-apiserver-operator_openshift-apiserver-operator-7bf7f6b755-hdjv7 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"23a473da2dce1515b2a06d3b42516c4a6eb5d0c47812c1f3ff01059c2135c99c\" Netns:\"/var/run/netns/adbb2042-7f5a-4189-80a5-56147d9c4196\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-apiserver-operator;K8S_POD_NAME=openshift-apiserver-operator-7bf7f6b755-hdjv7;K8S_POD_INFRA_CONTAINER_ID=23a473da2dce1515b2a06d3b42516c4a6eb5d0c47812c1f3ff01059c2135c99c;K8S_POD_UID=6f76d12f-5406-47e2-8337-2f50e35376d6\" Path:\"\" ERRORED: error configuring pod [openshift-apiserver-operator/openshift-apiserver-operator-7bf7f6b755-hdjv7] networking: [openshift-apiserver-operator/openshift-apiserver-operator-7bf7f6b755-hdjv7/6f76d12f-5406-47e2-8337-2f50e35376d6:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:26Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.7/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:29Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59\" in 7.408s (7.408s including waiting). Image size: 506741476 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"LeaderElection","message":"openshift-apiserver-operator-7bf7f6b755-hdjv7_a0207f64-a69c-442b-82f6-795d9d42da97 became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.29\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.29\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=false,StreamingCollectionEncodingToProtobuf=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n  }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for observed configuration to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for observed configuration to be available\\nAPIServerWorkloadDegraded: \" to \"All is well\",Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:53Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:53Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:37:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:23Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:24Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:24Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.29\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.29\"}] to [{\"operator\" \"4.18.29\"} {\"openshift-apiserver\" \"4.18.29\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:25Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"apps.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"authorization.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"build.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"image.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"project.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"quota.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"route.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"security.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OpenShiftAPICheckFailed","message":"\"template.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: \\\"apps.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"authorization.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"build.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"image.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"project.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"quota.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"route.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"security.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"template.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:40:26Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007761115114533341020203 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:32:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-5f85974995 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:32:17Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5f85974995-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:35:53Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-5f85974995-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:35:55Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:35:55Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-5f85974995-dwh5t","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:08Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5f85974995-dwh5t to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:08Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_openshift-kube-scheduler-operator-5f85974995-dwh5t_openshift-kube-scheduler-operator_4825316a-ea9f-4d3d-838b-fa809a6e49c7_0(1478dbbbd3cfbc5cb76d924765ade9dd3e1187eeedc74f74e2dce5250f4a065f): error adding pod openshift-kube-scheduler-operator_openshift-kube-scheduler-operator-5f85974995-dwh5t to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"1478dbbbd3cfbc5cb76d924765ade9dd3e1187eeedc74f74e2dce5250f4a065f\" Netns:\"/var/run/netns/70c7ba8b-77d1-4864-84e1-9192e7f66f5f\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-scheduler-operator;K8S_POD_NAME=openshift-kube-scheduler-operator-5f85974995-dwh5t;K8S_POD_INFRA_CONTAINER_ID=1478dbbbd3cfbc5cb76d924765ade9dd3e1187eeedc74f74e2dce5250f4a065f;K8S_POD_UID=4825316a-ea9f-4d3d-838b-fa809a6e49c7\" Path:\"\" ERRORED: error configuring pod [openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5f85974995-dwh5t] networking: [openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5f85974995-dwh5t/4825316a-ea9f-4d3d-838b-fa809a6e49c7:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:14Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_openshift-kube-scheduler-operator-5f85974995-dwh5t_openshift-kube-scheduler-operator_4825316a-ea9f-4d3d-838b-fa809a6e49c7_0(6e6b1407e6071c00fe86e46f8f8a3e65c86400a4bd062b3f6a6acaa210ad27ba): error adding pod openshift-kube-scheduler-operator_openshift-kube-scheduler-operator-5f85974995-dwh5t to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"6e6b1407e6071c00fe86e46f8f8a3e65c86400a4bd062b3f6a6acaa210ad27ba\" Netns:\"/var/run/netns/bb08f90c-ea21-4888-a7ad-5fef85d02a73\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-scheduler-operator;K8S_POD_NAME=openshift-kube-scheduler-operator-5f85974995-dwh5t;K8S_POD_INFRA_CONTAINER_ID=6e6b1407e6071c00fe86e46f8f8a3e65c86400a4bd062b3f6a6acaa210ad27ba;K8S_POD_UID=4825316a-ea9f-4d3d-838b-fa809a6e49c7\" Path:\"\" ERRORED: error configuring pod [openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5f85974995-dwh5t] networking: [openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-5f85974995-dwh5t/4825316a-ea9f-4d3d-838b-fa809a6e49c7:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:30Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce\" in 6.216s (6.216s including waiting). Image size: 500848684 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.29\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to False (\"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.29\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-5f85974995-dwh5t_2174bb62-97dd-4b70-a80d-cbc50e578c71 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:45Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:50Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:50Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:50Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:50Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nNodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:51Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:54Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:37:59Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:00Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:01Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"optional secret/serving-cert has been created\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:01Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:10Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:10Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:11Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:12Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:38:18Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:40:26Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000516015114533341016340 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:37:56Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.33/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:37:57Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:37:57Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:37:57Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:38:07Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:38:13Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:38:14Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:38:14Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:38:17Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:38:20Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.43/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:38:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:38:21Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2025-12-05T10:38:21Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000020755015114533341022015 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:32:06Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-848f645654 to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:32:17Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-848f645654-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:35:52Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-848f645654-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:35:55Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:35:55Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-848f645654-rmdb8","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:08Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-848f645654-rmdb8 to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:08Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_kube-controller-manager-operator-848f645654-rmdb8_openshift-kube-controller-manager-operator_11f563d5-89bb-433c-956a-6d5d2492e8f1_0(e0abdf47379f1e4f4273c269024eca936557d68b103bfe71c1226905eb88e5ff): error adding pod openshift-kube-controller-manager-operator_kube-controller-manager-operator-848f645654-rmdb8 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"e0abdf47379f1e4f4273c269024eca936557d68b103bfe71c1226905eb88e5ff\" Netns:\"/var/run/netns/5e13bc21-7f5b-401d-ac04-f030a1811db8\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager-operator;K8S_POD_NAME=kube-controller-manager-operator-848f645654-rmdb8;K8S_POD_INFRA_CONTAINER_ID=e0abdf47379f1e4f4273c269024eca936557d68b103bfe71c1226905eb88e5ff;K8S_POD_UID=11f563d5-89bb-433c-956a-6d5d2492e8f1\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager-operator/kube-controller-manager-operator-848f645654-rmdb8] networking: [openshift-kube-controller-manager-operator/kube-controller-manager-operator-848f645654-rmdb8/11f563d5-89bb-433c-956a-6d5d2492e8f1:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:14Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_kube-controller-manager-operator-848f645654-rmdb8_openshift-kube-controller-manager-operator_11f563d5-89bb-433c-956a-6d5d2492e8f1_0(246d13096f4f47d806b7ca1bbe78eb6a0e35420a7c23f854b7e4a33686221ada): error adding pod openshift-kube-controller-manager-operator_kube-controller-manager-operator-848f645654-rmdb8 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"246d13096f4f47d806b7ca1bbe78eb6a0e35420a7c23f854b7e4a33686221ada\" Netns:\"/var/run/netns/df186742-b74d-4a28-bd17-a8e51d863583\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-controller-manager-operator;K8S_POD_NAME=kube-controller-manager-operator-848f645654-rmdb8;K8S_POD_INFRA_CONTAINER_ID=246d13096f4f47d806b7ca1bbe78eb6a0e35420a7c23f854b7e4a33686221ada;K8S_POD_UID=11f563d5-89bb-433c-956a-6d5d2492e8f1\" Path:\"\" ERRORED: error configuring pod [openshift-kube-controller-manager-operator/kube-controller-manager-operator-848f645654-rmdb8] networking: [openshift-kube-controller-manager-operator/kube-controller-manager-operator-848f645654-rmdb8/11f563d5-89bb-433c-956a-6d5d2492e8f1:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:26Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:29Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9\" in 7.418s (7.419s including waiting). Image size: 503340749 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"LeaderElection","message":"kube-controller-manager-operator-848f645654-rmdb8_fbc0f71d-6a44-4abd-b8d6-fcb29166ba97 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.29\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.29\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=false,StreamingCollectionEncodingToProtobuf=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=false,StreamingCollectionEncodingToProtobuf=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:43Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:45Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-lffcv\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n  \t\"extendedArguments\": map[string]any{\"cluster-cidr\": []any{string(\"10.128.0.0/16\")}, \"cluster-name\": []any{string(\"sno-lffcv\")}, \"feature-gates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...}, \"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")}},\n  \t\"featureGates\": []any{string(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"), string(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"), ...},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n  \t\"servingInfo\": map[string]any{\"cipherSuites\": []any{string(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"), string(\"TLS_CHACHA20_POLY1305_SHA256\"), string(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"), ...}, \"minTLSVersion\": string(\"VersionTLS12\")},\n  }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:50Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:50Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:53Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:53Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:53Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:53Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:57Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:37:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.25:41688-\u003e172.30.0.10:53: read: connection refused\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:01Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nGarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.25:41688-\u003e172.30.0.10:53: read: connection refused\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:10Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:12Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:13Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:13Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:15Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:16Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:17Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:17Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:18Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:20Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:20Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:22Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:27Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:30Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:38:32Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:19Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"InstallerPodFailed","message":"Failed to create installer pod for revision 1 count 0 on node \"master-0\": client rate limiter Wait returned an error: context canceled","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"SecretCreateFailed","message":"Failed to create Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager: client rate limiter Wait returned an error: context canceled","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:29Z","reason":"LeaderElection","message":"kube-controller-manager-operator-848f645654-rmdb8_c51fcb77-6ed0-430a-829e-b1c9a1b3c0aa became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:29Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:29Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:29Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:30Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: icy-controller-config\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"controller-manager-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=38) \\\"kube-controller-cert-syncer-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"service-ca\\\",\\nNodeInstallerDegraded: (string) (len=15) \\\"recycler-config\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"cloud-config\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=39) \\\"kube-controller-manager-client-cert-key\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"csr-signer\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=66) \\\"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I1205 10:38:24.423067 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I1205 10:38:24.423082 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F1205 10:39:08.456301 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:33Z","reason":"InstallerPodFailed","message":"installer errors: installer: icy-controller-config\",\n (string) (len=29) \"controller-manager-kubeconfig\",\n (string) (len=38) \"kube-controller-cert-syncer-kubeconfig\",\n (string) (len=17) \"serviceaccount-ca\",\n (string) (len=10) \"service-ca\",\n (string) (len=15) \"recycler-config\"\n },\n OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=12) \"cloud-config\"\n },\n CertSecretNames: ([]string) (len=2 cap=2) {\n (string) (len=39) \"kube-controller-manager-client-cert-key\",\n (string) (len=10) \"csr-signer\"\n },\n OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\n CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=66) \"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\nI1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI1205 10:38:24.423067 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI1205 10:38:24.423082 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\nF1205 10:39:08.456301 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:38Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:38Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/config has changed,required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: Timeout: request did not complete within requested timeout - context deadline exceeded\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: icy-controller-config\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"controller-manager-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=38) \\\"kube-controller-cert-syncer-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"service-ca\\\",\\nNodeInstallerDegraded: (string) (len=15) \\\"recycler-config\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"cloud-config\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=39) \\\"kube-controller-manager-client-cert-key\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"csr-signer\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=66) \\\"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I1205 10:38:24.423067 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I1205 10:38:24.423082 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F1205 10:39:08.456301 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: icy-controller-config\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"controller-manager-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=38) \\\"kube-controller-cert-syncer-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"service-ca\\\",\\nNodeInstallerDegraded: (string) (len=15) \\\"recycler-config\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"cloud-config\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=39) \\\"kube-controller-manager-client-cert-key\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"csr-signer\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=66) \\\"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I1205 10:38:24.423067 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I1205 10:38:24.423082 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F1205 10:39:08.456301 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeInstallerDegraded: 1 nodes are failing on revision 1:\\nNodeInstallerDegraded: installer: icy-controller-config\\\",\\nNodeInstallerDegraded: (string) (len=29) \\\"controller-manager-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=38) \\\"kube-controller-cert-syncer-kubeconfig\\\",\\nNodeInstallerDegraded: (string) (len=17) \\\"serviceaccount-ca\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"service-ca\\\",\\nNodeInstallerDegraded: (string) (len=15) \\\"recycler-config\\\"\\nNodeInstallerDegraded: },\\nNodeInstallerDegraded: OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=12) \\\"cloud-config\\\"\\nNodeInstallerDegraded: CertSecretNames: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=39) \\\"kube-controller-manager-client-cert-key\\\",\\nNodeInstallerDegraded: (string) (len=10) \\\"csr-signer\\\"\\nNodeInstallerDegraded: OptionalCertSecretNamePrefixes: ([]string) \u003cnil\u003e,\\nNodeInstallerDegraded: CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) {\\nNodeInstallerDegraded: (string) (len=20) \\\"aggregator-client-ca\\\",\\nNodeInstallerDegraded: (string) (len=9) \\\"client-ca\\\"\\nNodeInstallerDegraded: OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\\nNodeInstallerDegraded: (string) (len=17) \\\"trusted-ca-bundle\\\"\\nNodeInstallerDegraded: CertDir: (string) (len=66) \\\"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs\\\",\\nNodeInstallerDegraded: ResourceDir: (string) (len=36) \\\"/etc/kubernetes/static-pod-resources\\\",\\nNodeInstallerDegraded: PodManifestDir: (string) (len=25) \\\"/etc/kubernetes/manifests\\\",\\nNodeInstallerDegraded: Timeout: (time.Duration) 2m0s,\\nNodeInstallerDegraded: StaticPodManifestsLockFile: (string) \\\"\\\",\\nNodeInstallerDegraded: PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\\nNodeInstallerDegraded: KubeletVersion: (string) \\\"\\\"\\nNodeInstallerDegraded: })\\nNodeInstallerDegraded: I1205 10:38:24.270737 1 cmd.go:413] Getting controller reference for node master-0\\nNodeInstallerDegraded: I1205 10:38:24.422992 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\\nNodeInstallerDegraded: I1205 10:38:24.423067 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"WatchListClient\\\" enabled=false\\nNodeInstallerDegraded: I1205 10:38:24.423082 1 envvar.go:172] \\\"Feature gate default state\\\" feature=\\\"InformerResourceVersion\\\" enabled=false\\nNodeInstallerDegraded: I1205 10:38:24.447385 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\\nNodeInstallerDegraded: I1205 10:38:54.452566 1 cmd.go:524] Getting installer pods for node master-0\\nNodeInstallerDegraded: F1205 10:39:08.456301 1 cmd.go:109] Get \\\"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/pods?labelSelector=app%3Dinstaller\\\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\\nNodeInstallerDegraded: \" to \"NodeControllerDegraded: All master nodes are ready\",Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:42Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2025-12-05T10:40:58Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000000316115114533341020154 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-05T10:38:23Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.47/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-05T10:38:23Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-05T10:38:23Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-05T10:38:23Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-05T10:40:42Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.49/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-05T10:40:42Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-05T10:40:43Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2025-12-05T10:40:43Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215114533341016360 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2025-12-05T10:38:20Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2025-12-05T10:38:20Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2025-12-05T10:38:21Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2025-12-05T10:38:21Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000020737315114533341020225 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:32:22Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-765d9ff747 to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:32:23Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-765d9ff747-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:35:53Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-765d9ff747-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:35:55Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-765d9ff747-p57fl","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:35:55Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:08Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-765d9ff747-p57fl to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:08Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_kube-apiserver-operator-765d9ff747-p57fl_openshift-kube-apiserver-operator_444f8808-e454-4015-9e20-429e715a08c7_0(2788d56fa426b4c865f7d79c8d59769775aa83f7f48d9d978cf6a2b76ece0330): error adding pod openshift-kube-apiserver-operator_kube-apiserver-operator-765d9ff747-p57fl to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"2788d56fa426b4c865f7d79c8d59769775aa83f7f48d9d978cf6a2b76ece0330\" Netns:\"/var/run/netns/f9ad0b0b-d35d-4d49-9b97-5f1fe1949d54\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-apiserver-operator;K8S_POD_NAME=kube-apiserver-operator-765d9ff747-p57fl;K8S_POD_INFRA_CONTAINER_ID=2788d56fa426b4c865f7d79c8d59769775aa83f7f48d9d978cf6a2b76ece0330;K8S_POD_UID=444f8808-e454-4015-9e20-429e715a08c7\" Path:\"\" ERRORED: error configuring pod [openshift-kube-apiserver-operator/kube-apiserver-operator-765d9ff747-p57fl] networking: [openshift-kube-apiserver-operator/kube-apiserver-operator-765d9ff747-p57fl/444f8808-e454-4015-9e20-429e715a08c7:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:14Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_kube-apiserver-operator-765d9ff747-p57fl_openshift-kube-apiserver-operator_444f8808-e454-4015-9e20-429e715a08c7_0(50b9e908c504df062d661ebea36016ad2ba1925c6aaa0df2e2004008f3649d97): error adding pod openshift-kube-apiserver-operator_kube-apiserver-operator-765d9ff747-p57fl to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"50b9e908c504df062d661ebea36016ad2ba1925c6aaa0df2e2004008f3649d97\" Netns:\"/var/run/netns/36ce2eb9-0b64-4b0c-b9bb-54be4d998e79\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-kube-apiserver-operator;K8S_POD_NAME=kube-apiserver-operator-765d9ff747-p57fl;K8S_POD_INFRA_CONTAINER_ID=50b9e908c504df062d661ebea36016ad2ba1925c6aaa0df2e2004008f3649d97;K8S_POD_UID=444f8808-e454-4015-9e20-429e715a08c7\" Path:\"\" ERRORED: error configuring pod [openshift-kube-apiserver-operator/kube-apiserver-operator-765d9ff747-p57fl] networking: [openshift-kube-apiserver-operator/kube-apiserver-operator-765d9ff747-p57fl/444f8808-e454-4015-9e20-429e715a08c7:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:26Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.14/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:28Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:29Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:30Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:30Z","reason":"LeaderElection","message":"kube-apiserver-operator-765d9ff747-p57fl_33a45987-6d02-4a6c-84a8-f042f6ae94ec became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:30Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.29\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:30Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:30Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\"),Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:31Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.29\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:31Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:31Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:32Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:32Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:33Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:33Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:33Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:33Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:33Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:34Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:34Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:35Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:35Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:35Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:35Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_ExternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:43Z","reason":"SecretCreateFailed","message":"Failed to create Secret/bound-service-account-signing-key -n openshift-kube-apiserver: secrets \"bound-service-account-signing-key\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:45Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:45Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:45Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:45Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:45Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:48Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:48Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:50Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:51Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,StreamingCollectionEncodingToJSON=false,StreamingCollectionEncodingToProtobuf=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nCertRotation_ControlPlaneNodeAdminClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\" to \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:56Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:57Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:37:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:01Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:05Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nNodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:10Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:12Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:14Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:14Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:17Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:17Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:38:20Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:40:26Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001302315114533341014352 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:37:58Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.36/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:37:58Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:38:01Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:38:01Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:38:32Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:38:32Z","reason":"Killing","message":"Stopping container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:38:45Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:38:46Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:38:46Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:00Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:00Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:00Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:14Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:14Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:14Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:28Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:28Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:29Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:29Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:29Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:29Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:29Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:29Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:29Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:30Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2025-12-05T10:39:30Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000004400115114533341016203 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:32:08Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-5bf4d88c6f to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:32:19Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5bf4d88c6f-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:35:52Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-5bf4d88c6f-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:35:54Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-5bf4d88c6f-n8t5c","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:35:54Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:08Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:09Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_etcd-operator-5bf4d88c6f-n8t5c_openshift-etcd-operator_f7a08359-0379-4364-8b0c-ddb58ff605f4_0(750661c57588737ef708cd550d7ce5c96c84e2bbd40104b467e0d65b8655aec0): error adding pod openshift-etcd-operator_etcd-operator-5bf4d88c6f-n8t5c to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"750661c57588737ef708cd550d7ce5c96c84e2bbd40104b467e0d65b8655aec0\" Netns:\"/var/run/netns/3a3b18b9-f2b6-4219-91d8-66919b044171\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-etcd-operator;K8S_POD_NAME=etcd-operator-5bf4d88c6f-n8t5c;K8S_POD_INFRA_CONTAINER_ID=750661c57588737ef708cd550d7ce5c96c84e2bbd40104b467e0d65b8655aec0;K8S_POD_UID=f7a08359-0379-4364-8b0c-ddb58ff605f4\" Path:\"\" ERRORED: error configuring pod [openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c] networking: [openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c/f7a08359-0379-4364-8b0c-ddb58ff605f4:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:14Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_etcd-operator-5bf4d88c6f-n8t5c_openshift-etcd-operator_f7a08359-0379-4364-8b0c-ddb58ff605f4_0(0c5bdb377673d87d670ff147b5fadcd36bc9d0da1081d5ef273c151383f9125c): error adding pod openshift-etcd-operator_etcd-operator-5bf4d88c6f-n8t5c to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"0c5bdb377673d87d670ff147b5fadcd36bc9d0da1081d5ef273c151383f9125c\" Netns:\"/var/run/netns/036aeffb-a53b-4eaf-8c7f-0eb450ff3b27\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-etcd-operator;K8S_POD_NAME=etcd-operator-5bf4d88c6f-n8t5c;K8S_POD_INFRA_CONTAINER_ID=0c5bdb377673d87d670ff147b5fadcd36bc9d0da1081d5ef273c151383f9125c;K8S_POD_UID=f7a08359-0379-4364-8b0c-ddb58ff605f4\" Path:\"\" ERRORED: error configuring pod [openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c] networking: [openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c/f7a08359-0379-4364-8b0c-ddb58ff605f4:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:24Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:26Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:34Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a\" in 7.879s (7.879s including waiting). Image size: 512838054 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nScriptControllerDegraded: \\\"configmap/etcd-pod\\\": missing env var values\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"LeaderElection","message":"etcd-operator-5bf4d88c6f-n8t5c_e4f672e8-9be0-4114-88cb-45bbb6053eeb became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.29\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.29\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"ObservedConfigChanged","message":"Writing updated observed config:   map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n  }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:43Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:39:34Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:39:34Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:40:26Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2025-12-05T10:40:27Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"}]}events/openshift-machine-api.json0000640000000000000000000002616515114533341015621 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:38:28Z","reason":"ScalingReplicaSet","message":"Scaled up replica set control-plane-machine-set-operator-7df95c79b5 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:38:28Z","reason":"SuccessfulCreate","message":"Created pod: control-plane-machine-set-operator-7df95c79b5-qnq6t","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:38:28Z","reason":"Scheduled","message":"Successfully assigned openshift-machine-api/control-plane-machine-set-operator-7df95c79b5-qnq6t to master-0","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:38:29Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fd3e9f8f00a59bda7483ec7dc8a0ed602f9ca30e3d72b22072dbdf2819da3f61\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:38:29Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.48/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:38:31Z","reason":"LeaderElection","message":"control-plane-machine-set-operator-7df95c79b5-qnq6t_7773abee-854f-48bc-9e99-3fa3b9ad3268 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:38:31Z","reason":"Started","message":"Started container control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:38:31Z","reason":"Created","message":"Created container: control-plane-machine-set-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:38:31Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fd3e9f8f00a59bda7483ec7dc8a0ed602f9ca30e3d72b22072dbdf2819da3f61\" in 1.918s (1.918s including waiting). Image size: 465144618 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-autoscaler-operator-5f49d774cd to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set cluster-baremetal-operator-78f758c7b9 to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:44Z","reason":"ScalingReplicaSet","message":"Scaled up replica set machine-api-operator-88d48b57d to 1","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:45Z","reason":"SuccessfulCreate","message":"Created pod: cluster-baremetal-operator-78f758c7b9-6t2gm","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:45Z","reason":"SuccessfulCreate","message":"Created pod: cluster-autoscaler-operator-5f49d774cd-cfg5f","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:45Z","reason":"SuccessfulCreate","message":"Created pod: machine-api-operator-88d48b57d-x7jfs","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.50/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72bbe2c638872937108f647950ab8ad35c0428ca8ecc6a39a8314aace7d95078\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7c2431a990bcddde98829abda81950247021a2ebbabc964b1516ea046b5f1d4e\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a92c310ce30dcb3de85d6aac868e0d80919670fa29ef83d55edd96b0cae35563\"","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.51/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.58/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:40:49Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Started","message":"Started container baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843\" already present on machine","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Created","message":"Created container: cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Started","message":"Started container cluster-autoscaler-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"LeaderElection","message":"cluster-autoscaler-operator-5f49d774cd-cfg5f_6047f9e8-6def-4ffd-a407-8d37beffaa34 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a92c310ce30dcb3de85d6aac868e0d80919670fa29ef83d55edd96b0cae35563\" in 13.797s (13.797s including waiting). Image size: 465285478 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Created","message":"Created container: baremetal-kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:72bbe2c638872937108f647950ab8ad35c0428ca8ecc6a39a8314aace7d95078\" in 13.814s (13.814s including waiting). Image size: 450841337 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Started","message":"Started container cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7c2431a990bcddde98829abda81950247021a2ebbabc964b1516ea046b5f1d4e\" in 13.863s (13.863s including waiting). Image size: 856659740 bytes.","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Created","message":"Created container: machine-api-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Started","message":"Started container machine-api-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:03Z","reason":"Created","message":"Created container: cluster-baremetal-operator","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:04Z","reason":"LeaderElection","message":"cluster-baremetal-operator-78f758c7b9-6t2gm_2d6f0b35-f8a2-4feb-9fdd-cdadda24dc49 became leader","type":"Normal"},{"namespace":"openshift-machine-api","lastTimestamp":"2025-12-05T10:41:04Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443715114533341016562 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:02Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-85b8f855df-8g52w to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:02Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-85b8f855df-8g52w","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:02Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-85b8f855df to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:13Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.38/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:13Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:16Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c\" in 3.189s (3.189s including waiting). Image size: 499798563 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:17Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:17Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:17Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2025-12-05T10:38:17Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000124015114533341015103 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2025-12-05T10:37:58Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-05T10:37:58Z","reason":"SuccessfulCreate","message":"Created pod: router-default-5465c8b4db-s4c2f","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2025-12-05T10:37:58Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-5465c8b4db to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000022400315114533341020305 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:32:09Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-6c968fdfdf to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:32:19Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-6c968fdfdf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:35:51Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-6c968fdfdf-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:35:54Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:35:54Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-6c968fdfdf-t7sl8","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:08Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8 to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:09Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_authentication-operator-6c968fdfdf-t7sl8_openshift-authentication-operator_d95a56ba-c940-4e3e-aed6-d8c04f1871b6_0(aa0846858f773d130ce5a631569e5ed898f89b39a29a2f10a3d9985541255d1d): error adding pod openshift-authentication-operator_authentication-operator-6c968fdfdf-t7sl8 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"aa0846858f773d130ce5a631569e5ed898f89b39a29a2f10a3d9985541255d1d\" Netns:\"/var/run/netns/a6afdfd5-614a-4f71-8a84-5b57041533ef\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-authentication-operator;K8S_POD_NAME=authentication-operator-6c968fdfdf-t7sl8;K8S_POD_INFRA_CONTAINER_ID=aa0846858f773d130ce5a631569e5ed898f89b39a29a2f10a3d9985541255d1d;K8S_POD_UID=d95a56ba-c940-4e3e-aed6-d8c04f1871b6\" Path:\"\" ERRORED: error configuring pod [openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8] networking: [openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8/d95a56ba-c940-4e3e-aed6-d8c04f1871b6:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:14Z","reason":"FailedCreatePodSandBox","message":"Failed to create pod sandbox: rpc error: code = Unknown desc = failed to create pod network sandbox k8s_authentication-operator-6c968fdfdf-t7sl8_openshift-authentication-operator_d95a56ba-c940-4e3e-aed6-d8c04f1871b6_0(bfa791178c4de4020e3cf5258b4a8e921e9dfc657a67331584a783a9681ab59a): error adding pod openshift-authentication-operator_authentication-operator-6c968fdfdf-t7sl8 to CNI network \"multus-cni-network\": plugin type=\"multus-shim\" name=\"multus-cni-network\" failed (add): CmdAdd (shim): CNI request failed with status 400: 'ContainerID:\"bfa791178c4de4020e3cf5258b4a8e921e9dfc657a67331584a783a9681ab59a\" Netns:\"/var/run/netns/8fbbd7df-0eb5-4fdc-941d-7c312aebd746\" IfName:\"eth0\" Args:\"IgnoreUnknown=1;K8S_POD_NAMESPACE=openshift-authentication-operator;K8S_POD_NAME=authentication-operator-6c968fdfdf-t7sl8;K8S_POD_INFRA_CONTAINER_ID=bfa791178c4de4020e3cf5258b4a8e921e9dfc657a67331584a783a9681ab59a;K8S_POD_UID=d95a56ba-c940-4e3e-aed6-d8c04f1871b6\" Path:\"\" ERRORED: error configuring pod [openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8] networking: [openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8/d95a56ba-c940-4e3e-aed6-d8c04f1871b6:ovn-kubernetes]: error adding container to network \"ovn-kubernetes\": failed to send CNI request: Post \"http://dummy/\": dial unix /var/run/ovn-kubernetes/cni//ovn-cni-server.sock: connect: connection refused\n': StdinData: {\"binDir\":\"/var/lib/cni/bin\",\"clusterNetwork\":\"/host/run/multus/cni/net.d/10-ovn-kubernetes.conf\",\"cniVersion\":\"0.3.1\",\"daemonSocketDir\":\"/run/multus/socket\",\"globalNamespaces\":\"default,openshift-multus,openshift-sriov-network-operator,openshift-cnv\",\"logLevel\":\"verbose\",\"logToStderr\":true,\"name\":\"multus-cni-network\",\"namespaceIsolation\":true,\"type\":\"multus-shim\"}","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:26Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.23/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:27Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df\" in 8.859s (8.859s including waiting). Image size: 507687221 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:36Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:37Z","reason":"LeaderElection","message":"authentication-operator-6c968fdfdf-t7sl8_f60d92e2-565e-4209-990a-1d45879ce415 became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.29\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to False (\"All is well\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.29\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available changed from Unknown to False (\"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:39Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"ReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:40Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:41Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\\"oauthConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+\\u00a0\\t\\t\\t\\\"templates\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+\\u00a0\\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"serverArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"servingInfo\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"cipherSuites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:42Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-4cwjg\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-4cwjg\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:44Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from False to True (\"AuthenticatorCertKeyProgressing: waiting for the cert/key secret openshift-oauth-apiserver/openshift-authenticator-certs to appear\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:48Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:49Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:53Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:54Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:54Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:54Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:54Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:56Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:56Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:37:59Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:02Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nAPIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:05Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:05Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:05Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:08Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:21Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:21Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:21Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:21Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:21Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.29\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.29\"}] to [{\"operator\" \"4.18.29\"} {\"oauth-apiserver\" \"4.18.29\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:38:21Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.40.48:443/healthz\\\": dial tcp 172.30.40.48:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:39:30Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:39:30Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:39:37Z","reason":"Killing","message":"Container authentication-operator failed liveness probe, will be restarted","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:39:41Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:39:41Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2025-12-05T10:39:41Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015114533341016270 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2025-12-05T10:37:58Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2025-12-05T10:37:59Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003477315114533332014616 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":338,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-os-puller","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"collect-profiles","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015114533313014072 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000006772015114533301014541 0ustar0000000000000000Dec 05 10:39:06.829375 master-0 kubenswrapper[10444]: E1205 10:39:06.829171 10444 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{machine-approver-f797d8546-65t96.187e4b7f0107ae55 openshift-cluster-machine-approver 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-cluster-machine-approver,Name:machine-approver-f797d8546-65t96,UID:e4c3f514-33e8-4deb-932e-56ddf7281c4c,APIVersion:v1,ResourceVersion:8584,FieldPath:spec.containers{machine-approver-controller},},Reason:Pulled,Message:Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8cc27777e72233024fe84ee1faa168aec715a0b24912a3ce70715ddccba328df\" in 1.478s (1.478s including waiting). Image size: 461702648 bytes.,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2025-12-05 10:38:32.826023509 +0000 UTC m=+53.417936076,LastTimestamp:2025-12-05 10:38:32.826023509 +0000 UTC m=+53.417936076,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Dec 05 10:39:10.259554 master-0 kubenswrapper[10444]: E1205 10:39:10.259402 10444 controller.go:195] "Failed to update lease" err="Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 05 10:39:10.803697 master-0 kubenswrapper[10444]: I1205 10:39:10.803615 10444 patch_prober.go:28] interesting pod/authentication-operator-6c968fdfdf-t7sl8 container/authentication-operator namespace/openshift-authentication-operator: Liveness probe status=failure output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" start-of-body= Dec 05 10:39:10.803938 master-0 kubenswrapper[10444]: I1205 10:39:10.803687 10444 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8" podUID="d95a56ba-c940-4e3e-aed6-d8c04f1871b6" containerName="authentication-operator" probeResult="failure" output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" Dec 05 10:39:11.393961 master-0 kubenswrapper[10444]: E1205 10:39:11.393692 10444 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 05 10:39:14.624242 master-0 kubenswrapper[10444]: E1205 10:39:14.624131 10444 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0" Dec 05 10:39:20.260397 master-0 kubenswrapper[10444]: E1205 10:39:20.260168 10444 controller.go:195] "Failed to update lease" err="Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 05 10:39:20.802598 master-0 kubenswrapper[10444]: I1205 10:39:20.802523 10444 patch_prober.go:28] interesting pod/authentication-operator-6c968fdfdf-t7sl8 container/authentication-operator namespace/openshift-authentication-operator: Liveness probe status=failure output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" start-of-body= Dec 05 10:39:20.802598 master-0 kubenswrapper[10444]: I1205 10:39:20.802597 10444 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8" podUID="d95a56ba-c940-4e3e-aed6-d8c04f1871b6" containerName="authentication-operator" probeResult="failure" output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" Dec 05 10:39:21.395134 master-0 kubenswrapper[10444]: E1205 10:39:21.394927 10444 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 05 10:39:28.717140 master-0 kubenswrapper[10444]: E1205 10:39:28.717022 10444 kubelet.go:1929] "Failed creating a mirror pod for" err="Internal error occurred: admission plugin \"LimitRanger\" failed to complete mutation in 13s" pod="openshift-etcd/etcd-master-0" Dec 05 10:39:30.261811 master-0 kubenswrapper[10444]: E1205 10:39:30.261417 10444 controller.go:195] "Failed to update lease" err="Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 05 10:39:30.803353 master-0 kubenswrapper[10444]: I1205 10:39:30.803295 10444 patch_prober.go:28] interesting pod/authentication-operator-6c968fdfdf-t7sl8 container/authentication-operator namespace/openshift-authentication-operator: Liveness probe status=failure output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" start-of-body= Dec 05 10:39:30.803761 master-0 kubenswrapper[10444]: I1205 10:39:30.803722 10444 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-authentication-operator/authentication-operator-6c968fdfdf-t7sl8" podUID="d95a56ba-c940-4e3e-aed6-d8c04f1871b6" containerName="authentication-operator" probeResult="failure" output="Get \"https://10.128.0.23:8443/healthz\": dial tcp 10.128.0.23:8443: connect: connection refused" Dec 05 10:39:31.396125 master-0 kubenswrapper[10444]: E1205 10:39:31.396053 10444 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 05 10:39:34.718241 master-0 kubenswrapper[10444]: I1205 10:39:34.718128 10444 patch_prober.go:28] interesting pod/etcd-operator-5bf4d88c6f-n8t5c container/etcd-operator namespace/openshift-etcd-operator: Liveness probe status=failure output="Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused" start-of-body= Dec 05 10:39:34.718862 master-0 kubenswrapper[10444]: I1205 10:39:34.718255 10444 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-etcd-operator/etcd-operator-5bf4d88c6f-n8t5c" podUID="f7a08359-0379-4364-8b0c-ddb58ff605f4" containerName="etcd-operator" probeResult="failure" output="Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused" Dec 05 10:39:37.606542 master-0 kubenswrapper[10444]: E1205 10:39:37.606467 10444 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Dec 05 10:39:37.607673 master-0 kubenswrapper[10444]: E1205 10:39:37.606641 10444 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.013s" Dec 05 10:39:40.261871 master-0 kubenswrapper[10444]: E1205 10:39:40.261738 10444 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="200ms" Dec 05 10:39:40.831399 master-0 kubenswrapper[10444]: E1205 10:39:40.831275 10444 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{machine-approver-f797d8546-65t96.187e4b7f102bb3a0 openshift-cluster-machine-approver 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-cluster-machine-approver,Name:machine-approver-f797d8546-65t96,UID:e4c3f514-33e8-4deb-932e-56ddf7281c4c,APIVersion:v1,ResourceVersion:8584,FieldPath:spec.containers{machine-approver-controller},},Reason:Created,Message:Created container: machine-approver-controller,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2025-12-05 10:38:33.0800424 +0000 UTC m=+53.671955007,LastTimestamp:2025-12-05 10:38:33.0800424 +0000 UTC m=+53.671955007,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Dec 05 10:39:41.398141 master-0 kubenswrapper[10444]: E1205 10:39:41.398070 10444 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 05 10:39:41.398141 master-0 kubenswrapper[10444]: E1205 10:39:41.398124 10444 kubelet_node_status.go:572] "Unable to update node status" err="update node status exceeds retry count" Dec 05 10:39:50.462722 master-0 kubenswrapper[10444]: E1205 10:39:50.462618 10444 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="400ms" Dec 05 10:40:00.864761 master-0 kubenswrapper[10444]: E1205 10:40:00.864678 10444 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": context deadline exceeded" interval="800ms" Dec 05 10:40:01.418760 master-0 kubenswrapper[10444]: E1205 10:40:01.418578 10444 kubelet_node_status.go:585] "Error updating node status, will retry" err="failed to patch status \"{\\\"status\\\":{\\\"$setElementOrder/conditions\\\":[{\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"type\\\":\\\"DiskPressure\\\"},{\\\"type\\\":\\\"PIDPressure\\\"},{\\\"type\\\":\\\"Ready\\\"}],\\\"conditions\\\":[{\\\"lastHeartbeatTime\\\":\\\"2025-12-05T10:39:51Z\\\",\\\"type\\\":\\\"MemoryPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-12-05T10:39:51Z\\\",\\\"type\\\":\\\"DiskPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-12-05T10:39:51Z\\\",\\\"type\\\":\\\"PIDPressure\\\"},{\\\"lastHeartbeatTime\\\":\\\"2025-12-05T10:39:51Z\\\",\\\"type\\\":\\\"Ready\\\"}],\\\"images\\\":[{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b\\\"],\\\"sizeBytes\\\":1631758507},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9014f384de5f9a0b7418d5869ad349abb9588d16bd09ed650a163c045315dbff\\\"],\\\"sizeBytes\\\":1232140918},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6\\\"],\\\"sizeBytes\\\":983705650},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264\\\"],\\\"sizeBytes\\\":938303566},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:631a3798b749fecc041a99929eb946618df723e15055e805ff752a1a1273481c\\\"],\\\"sizeBytes\\\":870567329},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9\\\"],\\\"sizeBytes\\\":857069957},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1b12f830c3316aa4dc061c2d00c74126282b3e2bcccc301eab00d57fff3c4c7c\\\"],\\\"sizeBytes\\\":767284906},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cb3ec61f9a932a9ad13bdeb44bcf9477a8d5f728151d7f19ed3ef7d4b02b3a82\\\"],\\\"sizeBytes\\\":682371258},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:916566bb9d0143352324233d460ad94697719c11c8c9158e3aea8f475941751f\\\"],\\\"sizeBytes\\\":677523572},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b\\\"],\\\"sizeBytes\\\":672407260},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123\\\"],\\\"sizeBytes\\\":616108962},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf\\\"],\\\"sizeBytes\\\":583836304},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2\\\"],\\\"sizeBytes\\\":576619763},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eddedae7578d79b5a3f748000ae5c00b9f14a04710f9f9ec7b52fc569be5dfb8\\\"],\\\"sizeBytes\\\":552673986},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:aa24edce3d740f84c40018e94cdbf2bc7375268d13d57c2d664e43a46ccea3fc\\\"],\\\"sizeBytes\\\":543227406},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718\\\"],\\\"sizeBytes\\\":532719167},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cfde59e48cd5dee3721f34d249cb119cc3259fd857965d34f9c7ed83b0c363a1\\\"],\\\"sizeBytes\\\":532402162},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a\\\"],\\\"sizeBytes\\\":512838054},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\\\"],\\\"sizeBytes\\\":512452153},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660\\\"],\\\"sizeBytes\\\":509437356},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df\\\"],\\\"sizeBytes\\\":507687221},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59\\\"],\\\"sizeBytes\\\":506741476},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b\\\"],\\\"sizeBytes\\\":505649178},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86af77350cfe6fd69280157e4162aa0147873d9431c641ae4ad3e881ff768a73\\\"],\\\"sizeBytes\\\":505628211},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9\\\"],\\\"sizeBytes\\\":503340749},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8139ed65c0a0a4b0f253b715c11cc52be027efe8a4774da9ccce35c78ef439da\\\"],\\\"sizeBytes\\\":503011144},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8eabac819f289e29d75c7ab172d8124554849a47f0b00770928c3eb19a5a31c4\\\"],\\\"sizeBytes\\\":502436444},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:10e57ca7611f79710f05777dc6a8f31c7e04eb09da4d8d793a5acfbf0e4692d7\\\"],\\\"sizeBytes\\\":500943492},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce\\\"],\\\"sizeBytes\\\":500848684},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c\\\"],\\\"sizeBytes\\\":499798563},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96\\\"],\\\"sizeBytes\\\":499705918},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:75d996f6147edb88c09fd1a052099de66638590d7d03a735006244bc9e19f898\\\"],\\\"sizeBytes\\\":499082775},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3b8d91a25eeb9f02041e947adb3487da3e7ab8449d3d2ad015827e7954df7b34\\\"],\\\"sizeBytes\\\":490455952},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68\\\"],\\\"sizeBytes\\\":489528665},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c416b201d480bddb5a4960ec42f4740761a1335001cf84ba5ae19ad6857771b1\\\"],\\\"sizeBytes\\\":481559117},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c3a77aa4d03b89ea284e3467a268e5989a77a2ef63e685eb1d5c5ea5b3922b7a\\\"],\\\"sizeBytes\\\":478917802},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb928c13a46d3fb45f4a881892d023a92d610a5430be0ffd916aaf8da8e7d297\\\"],\\\"sizeBytes\\\":478642572},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:fd3e9f8f00a59bda7483ec7dc8a0ed602f9ca30e3d72b22072dbdf2819da3f61\\\"],\\\"sizeBytes\\\":465144618},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3c1edf52f70bf9b1d1457e0c4111bc79cdaa1edd659ddbdb9d8176eff8b46956\\\"],\\\"sizeBytes\\\":462727837},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8cc27777e72233024fe84ee1faa168aec715a0b24912a3ce70715ddccba328df\\\"],\\\"sizeBytes\\\":461702648},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843\\\"],\\\"sizeBytes\\\":459552216},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d3ce2cbf1032ad0f24f204db73687002fcf302e86ebde3945801c74351b64576\\\"],\\\"sizeBytes\\\":458169255},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7664a2d4cb10e82ed32abbf95799f43fc3d10135d7dd94799730de504a89680a\\\"],\\\"sizeBytes\\\":452589750},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4ecc5bac651ff1942865baee5159582e9602c89b47eeab18400a32abcba8f690\\\"],\\\"sizeBytes\\\":451039520},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2632d7f05d5a992e91038ded81c715898f3fe803420a9b67a0201e9fd8075213\\\"],\\\"sizeBytes\\\":443291941},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b\\\"],\\\"sizeBytes\\\":442509555},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7e438b814f8e16f00b3fc4b69991af80eee79ae111d2a707f34aa64b2ccbb6eb\\\"],\\\"sizeBytes\\\":437737925},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b00c658332d6c6786bd969b26097c20a78c79c045f1692a8809234f5fb586c22\\\"],\\\"sizeBytes\\\":433122306},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8a3d37aa7a22c68afa963ecfb4b43c52cccf152580cd66e4d5382fb69e4037cc\\\"],\\\"sizeBytes\\\":406053031},{\\\"names\\\":[\\\"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9432c13d76bd4ba4eb9197c050cf88c0d701fa2055eeb59257e2e23901f9fdff\\\"],\\\"sizeBytes\\\":401810450}]}}\" for node \"master-0\": Patch \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0/status?timeout=10s\": context deadline exceeded" Dec 05 10:40:11.419355 master-0 kubenswrapper[10444]: E1205 10:40:11.419276 10444 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 05 10:40:11.618667 master-0 kubenswrapper[10444]: E1205 10:40:11.618558 10444 mirror_client.go:138] "Failed deleting a mirror pod" err="Timeout: request did not complete within requested timeout - context deadline exceeded" pod="openshift-etcd/etcd-master-0-master-0" Dec 05 10:40:11.618937 master-0 kubenswrapper[10444]: E1205 10:40:11.618797 10444 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="34.012s" Dec 05 10:40:11.666476 master-0 kubenswrapper[10444]: E1205 10:40:11.666366 10444 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="1.6s" Dec 05 10:40:14.834602 master-0 kubenswrapper[10444]: E1205 10:40:14.834356 10444 event.go:359] "Server rejected event (will not retry!)" err="Timeout: request did not complete within requested timeout - context deadline exceeded" event="&Event{ObjectMeta:{machine-approver-f797d8546-65t96.187e4b7f10fd4b17 openshift-cluster-machine-approver 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-cluster-machine-approver,Name:machine-approver-f797d8546-65t96,UID:e4c3f514-33e8-4deb-932e-56ddf7281c4c,APIVersion:v1,ResourceVersion:8584,FieldPath:spec.containers{machine-approver-controller},},Reason:Started,Message:Started container machine-approver-controller,Source:EventSource{Component:kubelet,Host:master-0,},FirstTimestamp:2025-12-05 10:38:33.093778199 +0000 UTC m=+53.685690776,LastTimestamp:2025-12-05 10:38:33.093778199 +0000 UTC m=+53.685690776,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:master-0,}" Dec 05 10:40:21.419795 master-0 kubenswrapper[10444]: E1205 10:40:21.419679 10444 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 05 10:40:23.268176 master-0 kubenswrapper[10444]: E1205 10:40:23.267974 10444 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" interval="3.2s" Dec 05 10:40:26.955330 master-0 kubenswrapper[10444]: E1205 10:40:26.955266 10444 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="15.336s" Dec 05 10:40:26.964412 master-0 kubenswrapper[10444]: E1205 10:40:26.964385 10444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"openshift-controller-manager-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=openshift-controller-manager-operator pod=openshift-controller-manager-operator-6c8676f99d-cwvk5_openshift-controller-manager-operator(1e69ce9e-4e6f-4015-9ba6-5a7942570190)\"" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-6c8676f99d-cwvk5" podUID="1e69ce9e-4e6f-4015-9ba6-5a7942570190" Dec 05 10:40:27.160567 master-0 kubenswrapper[10444]: E1205 10:40:27.160522 10444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"openshift-controller-manager-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=openshift-controller-manager-operator pod=openshift-controller-manager-operator-6c8676f99d-cwvk5_openshift-controller-manager-operator(1e69ce9e-4e6f-4015-9ba6-5a7942570190)\"" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-6c8676f99d-cwvk5" podUID="1e69ce9e-4e6f-4015-9ba6-5a7942570190" Dec 05 10:40:28.897132 master-0 kubenswrapper[10444]: I1205 10:40:28.897077 10444 patch_prober.go:28] interesting pod/catalogd-controller-manager-7cc89f4c4c-lth87 container/manager namespace/openshift-catalogd: Readiness probe status=failure output="Get \"http://10.128.0.40:8081/readyz\": dial tcp 10.128.0.40:8081: connect: connection refused" start-of-body= Dec 05 10:40:28.897255 master-0 kubenswrapper[10444]: I1205 10:40:28.897138 10444 prober.go:107] "Probe failed" probeType="Readiness" pod="openshift-catalogd/catalogd-controller-manager-7cc89f4c4c-lth87" podUID="a4fd453c-e667-4bdc-aa9e-3d95ff707200" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.40:8081/readyz\": dial tcp 10.128.0.40:8081: connect: connection refused" Dec 05 10:40:28.897255 master-0 kubenswrapper[10444]: I1205 10:40:28.897086 10444 patch_prober.go:28] interesting pod/catalogd-controller-manager-7cc89f4c4c-lth87 container/manager namespace/openshift-catalogd: Liveness probe status=failure output="Get \"http://10.128.0.40:8081/healthz\": dial tcp 10.128.0.40:8081: connect: connection refused" start-of-body= Dec 05 10:40:28.897352 master-0 kubenswrapper[10444]: I1205 10:40:28.897236 10444 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-catalogd/catalogd-controller-manager-7cc89f4c4c-lth87" podUID="a4fd453c-e667-4bdc-aa9e-3d95ff707200" containerName="manager" probeResult="failure" output="Get \"http://10.128.0.40:8081/healthz\": dial tcp 10.128.0.40:8081: connect: connection refused" Dec 05 10:40:31.305317 master-0 kubenswrapper[10444]: E1205 10:40:31.305255 10444 kubelet.go:1929] "Failed creating a mirror pod for" err="pods \"etcd-master-0\" already exists" pod="openshift-etcd/etcd-master-0" Dec 05 10:40:31.420103 master-0 kubenswrapper[10444]: E1205 10:40:31.420024 10444 kubelet_node_status.go:585] "Error updating node status, will retry" err="error getting node \"master-0\": Get \"https://api-int.sno.openstack.lab:6443/api/v1/nodes/master-0?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Dec 05 10:40:42.019849 master-0 kubenswrapper[10444]: E1205 10:40:42.019828 10444 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="6325f9a2-86d5-4fac-9e71-331b2628f965" containerName="installer" Dec 05 10:40:42.020027 master-0 kubenswrapper[10444]: E1205 10:40:42.020013 10444 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="738d9fe7-2d08-4aa4-842b-9cbeddf120fb" containerName="installer" Dec 05 10:40:42.020172 master-0 kubenswrapper[10444]: E1205 10:40:42.020161 10444 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e149cbe7-1ec3-4a06-af61-3a8906b8e9ef" containerName="installer" Dec 05 10:40:42.020316 master-0 kubenswrapper[10444]: E1205 10:40:42.020304 10444 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="5d8c854f-31f8-42d3-b28c-82c7d1b14ee9" containerName="installer" Dec 05 10:40:49.476370 master-0 kubenswrapper[10444]: E1205 10:40:49.476298 10444 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"764da1adef87c21629d5ea3147a93f78abf3cdffca97a9d1318be4acfa49409d\": container with ID starting with 764da1adef87c21629d5ea3147a93f78abf3cdffca97a9d1318be4acfa49409d not found: ID does not exist" containerID="764da1adef87c21629d5ea3147a93f78abf3cdffca97a9d1318be4acfa49409d" Dec 05 10:40:49.476824 master-0 kubenswrapper[10444]: E1205 10:40:49.476784 10444 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"e76e5b93c68d92fd9daa3ee4d7f2b34e1a08d418136f3b8db9e7bd4a18875608\": container with ID starting with e76e5b93c68d92fd9daa3ee4d7f2b34e1a08d418136f3b8db9e7bd4a18875608 not found: ID does not exist" containerID="e76e5b93c68d92fd9daa3ee4d7f2b34e1a08d418136f3b8db9e7bd4a18875608" Dec 05 10:40:49.914619 master-0 kubenswrapper[10444]: E1205 10:40:49.914595 10444 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e4c3f514-33e8-4deb-932e-56ddf7281c4c" containerName="machine-approver-controller" Dec 05 10:40:49.914619 master-0 kubenswrapper[10444]: E1205 10:40:49.914618 10444 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e4c3f514-33e8-4deb-932e-56ddf7281c4c" containerName="kube-rbac-proxy"aggregated/ingress_controllers_certs.json0000640000000000000000000000045715114533301017527 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2025-12-05T10:37:57Z","not_after":"2027-12-05T10:37:58Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2025-12-05T10:37:57Z","not_after":"2027-12-05T10:37:58Z","controllers":[]}]config/running_containers.json0000640000000000000000000000746215114533301015312 0ustar0000000000000000{"images":{"0":"sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","1":"sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","10":"sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2","11":"sha256:8139ed65c0a0a4b0f253b715c11cc52be027efe8a4774da9ccce35c78ef439da","12":"sha256:a824e468cf8dd61d347e35b2ee5bc2f815666957647098e21a1bb56ff613e5b9","13":"sha256:631a3798b749fecc041a99929eb946618df723e15055e805ff752a1a1273481c","14":"sha256:5451aa441e5b8d8689c032405d410c8049a849ef2edf77e5b6a5ce2838c6569b","15":"sha256:df606f3b71d4376d1a2108c09f0d3dab455fc30bcb67c60e91590c105e9025bf","16":"sha256:3c1edf52f70bf9b1d1457e0c4111bc79cdaa1edd659ddbdb9d8176eff8b46956","17":"sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","18":"sha256:8a3d37aa7a22c68afa963ecfb4b43c52cccf152580cd66e4d5382fb69e4037cc","19":"sha256:cfde59e48cd5dee3721f34d249cb119cc3259fd857965d34f9c7ed83b0c363a1","2":"sha256:188637a52cafee61ec461e92fb0c605e28be325b9ac1f2ac8a37d68e97654718","20":"sha256:fd3e9f8f00a59bda7483ec7dc8a0ed602f9ca30e3d72b22072dbdf2819da3f61","21":"sha256:2632d7f05d5a992e91038ded81c715898f3fe803420a9b67a0201e9fd8075213","22":"sha256:e85850a4ae1a1e3ec2c590a4936d640882b6550124da22031c85b526afbf52df","23":"sha256:8cc27777e72233024fe84ee1faa168aec715a0b24912a3ce70715ddccba328df","24":"sha256:b472823604757237c2d16bd6f6221f4cf562aa3b05942c7f602e1e8b2e55a7c6","25":"sha256:c416b201d480bddb5a4960ec42f4740761a1335001cf84ba5ae19ad6857771b1","26":"sha256:d64c13fe7663a0b4ae61d103b1b7598adcf317a01826f296bcb66b1a2de83c96","27":"sha256:10e57ca7611f79710f05777dc6a8f31c7e04eb09da4d8d793a5acfbf0e4692d7","28":"sha256:3b8d91a25eeb9f02041e947adb3487da3e7ab8449d3d2ad015827e7954df7b34","29":"sha256:c3a77aa4d03b89ea284e3467a268e5989a77a2ef63e685eb1d5c5ea5b3922b7a","3":"sha256:6d5891cdd7dcf7c9081de8b364b4c96446b7f946f7880fbae291a4592a198264","30":"sha256:75d996f6147edb88c09fd1a052099de66638590d7d03a735006244bc9e19f898","31":"sha256:4ecc5bac651ff1942865baee5159582e9602c89b47eeab18400a32abcba8f690","32":"sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","33":"sha256:916566bb9d0143352324233d460ad94697719c11c8c9158e3aea8f475941751f","34":"sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","35":"sha256:f042fa25014f3d37f3ea967d21f361d2a11833ae18f2c750318101b25d2497ce","36":"sha256:8375671da86aa527ee7e291d86971b0baa823ffc7663b5a983084456e76c0f59","37":"sha256:86af77350cfe6fd69280157e4162aa0147873d9431c641ae4ad3e881ff768a73","38":"sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","39":"sha256:aa24edce3d740f84c40018e94cdbf2bc7375268d13d57c2d664e43a46ccea3fc","4":"sha256:f1ca78c423f43f89a0411e40393642f64e4f8df9e5f61c25e31047c4cce170f9","40":"sha256:eb928c13a46d3fb45f4a881892d023a92d610a5430be0ffd916aaf8da8e7d297","41":"sha256:7664a2d4cb10e82ed32abbf95799f43fc3d10135d7dd94799730de504a89680a","42":"sha256:9432c13d76bd4ba4eb9197c050cf88c0d701fa2055eeb59257e2e23901f9fdff","43":"sha256:eddedae7578d79b5a3f748000ae5c00b9f14a04710f9f9ec7b52fc569be5dfb8","44":"sha256:b00c658332d6c6786bd969b26097c20a78c79c045f1692a8809234f5fb586c22","5":"sha256:0f43c31aa3359159d4557dad3cfaf812d8ce44db9cb9ae970e06d3479070b660","6":"sha256:f4d4282cb53325e737ad68abbfcb70687ae04fb50353f4f0ba0ba5703b15009a","7":"sha256:91af633e585621630c40d14f188e37d36b44678d0a59e582d850bf8d593d3a0c","8":"sha256:9014f384de5f9a0b7418d5869ad349abb9588d16bd09ed650a163c045315dbff","9":"sha256:7e438b814f8e16f00b3fc4b69991af80eee79ae111d2a707f34aa64b2ccbb6eb"},"containers":{"2025-12":{"0":10,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":1,"17":1,"18":1,"19":1,"2":6,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":4,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"5":3,"6":3,"7":2,"8":2,"9":2}}}operator-controller-controller-manager-7cbd59c7f8-dh5tt.json0000640000000000000000000002477415114533301032444 0ustar0000000000000000config/pod/openshift-operator-controller{"metadata":{"name":"operator-controller-controller-manager-7cbd59c7f8-dh5tt","generateName":"operator-controller-controller-manager-7cbd59c7f8-","namespace":"openshift-operator-controller","uid":"592373ae-a952-4dd3-a9bc-f9c9c19c0802","resourceVersion":"9077","creationTimestamp":"2025-12-05T10:38:08Z","labels":{"control-plane":"operator-controller-controller-manager","pod-template-hash":"7cbd59c7f8"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.41/23\"],\"mac_address\":\"0a:58:0a:80:00:29\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.41/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.41\"\n ],\n \"mac\": \"0a:58:0a:80:00:29\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"operator-controller-controller-manager-7cbd59c7f8","uid":"77dc8780-b0c1-4be4-958a-77ef05b79e80","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"operator-controller-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-rd87p","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","command":["/manager"],"args":["--health-probe-bind-address=:8081","--metrics-bind-address=127.0.0.1:8080","--leader-elect","--catalogd-cas-dir=/var/ca-certs","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"10m","memory":"64Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-rd87p","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=0.0.0.0:8443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":8443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-rd87p","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"operator-controller-controller-manager","serviceAccount":"operator-controller-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.41","podIPs":[{"ip":"10.128.0.41"}],"startTime":"2025-12-05T10:38:08Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-05T10:38:15Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://42ab2336c6be11ec1661443ac87e4b3c0d5e6ea08c7b98227a204a1767ffdd5a","started":true,"volumeMounts":[{"name":"kube-api-access-rd87p","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2025-12-05T10:40:28Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":" 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"bece09db-f0c4-4991-9e98-4522f4a30275\"\nI1205 10:40:24.173514 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"6023e36b-1147-4b74-b1b1-a5020ed33eda\"\nI1205 10:40:24.173531 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-certified-operators\" namespace=\"\" name=\"openshift-certified-operators\" reconcileID=\"6023e36b-1147-4b74-b1b1-a5020ed33eda\"\nI1205 10:40:24.173551 1 clustercatalog_controller.go:54] \"reconcile starting\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"58fd5ffb-1e1d-4585-b722-05499d9bb8c2\"\nI1205 10:40:24.173575 1 clustercatalog_controller.go:75] \"reconcile ending\" logger=\"cluster-catalog\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-community-operators\" namespace=\"\" name=\"openshift-community-operators\" reconcileID=\"58fd5ffb-1e1d-4585-b722-05499d9bb8c2\"\nI1205 10:40:27.891519 1 leaderelection.go:297] failed to renew lease openshift-operator-controller/9c4404e7.operatorframework.io: timed out waiting for the condition\nE1205 10:40:27.891639 1 main.go:362] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2025-12-05T10:38:14Z","finishedAt":"2025-12-05T10:40:27Z","containerID":"cri-o://665b41c4b05327dcf1d9daca6aa21544857362b43e6c7d8ef7fac95d7153f9b2"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f952cec1e5332b84bdffa249cd426f39087058d6544ddcec650a414c15a9b68","containerID":"cri-o://405cb7fe7c4f15258168a2b739de72c941100f0f87222e1596be37c3a536b301","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-rd87p","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-operator/network-operator-79767b7ff9-t8j2j.json0000640000000000000000000002514215114533301025321 0ustar0000000000000000{"metadata":{"name":"network-operator-79767b7ff9-t8j2j","generateName":"network-operator-79767b7ff9-","namespace":"openshift-network-operator","uid":"1a0235af-2cf2-4ad4-b419-764fb56a0107","resourceVersion":"8805","creationTimestamp":"2025-12-05T10:35:53Z","labels":{"name":"network-operator","pod-template-hash":"79767b7ff9"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-79767b7ff9","uid":"fd2b126b-2ca0-4bed-bc5c-16d9db685870","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-cwqkb","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e8b692483c302828daf4a1c5fd5ac89f8ead3fd3d3014740cd95e80d9ec14cb9"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9014f384de5f9a0b7418d5869ad349abb9588d16bd09ed650a163c045315dbff"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4ecc5bac651ff1942865baee5159582e9602c89b47eeab18400a32abcba8f690"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:916566bb9d0143352324233d460ad94697719c11c8c9158e3aea8f475941751f"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8a3d37aa7a22c68afa963ecfb4b43c52cccf152580cd66e4d5382fb69e4037cc"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:631a3798b749fecc041a99929eb946618df723e15055e805ff752a1a1273481c"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9432c13d76bd4ba4eb9197c050cf88c0d701fa2055eeb59257e2e23901f9fdff"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3ca8354f22e89b73f169cb2a51d47f6cc20903844a57240bdb5f5471a55a0c9"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:cfde59e48cd5dee3721f34d249cb119cc3259fd857965d34f9c7ed83b0c363a1"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2632d7f05d5a992e91038ded81c715898f3fe803420a9b67a0201e9fd8075213"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:18b14f0ccad06d93593440c0702d4d62f209ed80cdc899e0bc2dc0ebf54b006e"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:11d83fb97d5191861531c5463f84d0852f4383c00e851c32378f35ec3b242f94"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c2faf0b5a0c3da0538257e1bb8c87f26619b75fd3219fb673a9e5d1ef6ff2feb"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-cwqkb","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:36:06Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:35:59Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:35:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-05T10:35:59Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2025-12-05T10:40:27Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"nshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI1205 10:39:02.324487 1 log.go:245] reconciling (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter\nI1205 10:39:02.324538 1 log.go:245] could not apply (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: failed to apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI1205 10:39:02.324552 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter\nI1205 10:39:02.324620 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI1205 10:39:02.324638 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script\nI1205 10:39:02.324699 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: client rate limiter Wait returned an error: context canceled\nI1205 10:39:02.324717 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter\nI1205 10:39:02.324840 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI1205 10:39:07.318222 1 observer_polling.go:162] Shutting down file observer\nF1205 10:39:32.319522 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\n","startedAt":"2025-12-05T10:36:06Z","finishedAt":"2025-12-05T10:39:32Z","containerID":"cri-o://f1e6d80e2ae7d337901560dde2050e55f54f6b182ab45a5e1cce9ebc5f4043a9"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:9724d2036305cbd729e1f484c5bad89971de977fff8a6723fef1873858dd1123","containerID":"cri-o://a08f843706833dfc728e88e2c2cea79891e8c8393ef391e12533de6bef924933","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-cwqkb","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-ql7j7.json0000640000000000000000000002463315114533301025633 0ustar0000000000000000{"metadata":{"name":"network-node-identity-ql7j7","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"d807d0da-5cac-4c6a-afd8-5a1cd1e5e59e","resourceVersion":"8806","creationTimestamp":"2025-12-05T10:36:37Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"656c887c88","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"c86cceef-e3fd-49bc-8e09-96f647012c24","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-wg9zq","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-wg9zq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-wg9zq","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:36:55Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:36:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:36:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-05T10:36:37Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2025-12-05T10:40:27Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"r-2nrjr\"} reason=\"CSRApproved\"\nI1205 10:37:00.661071 1 approver.go:230] Finished syncing CSR csr-2nrjr for master-0 node in 6.331072ms\nI1205 10:37:00.661196 1 approver.go:230] Finished syncing CSR csr-2nrjr for unknown node in 59.301µs\nI1205 10:37:00.673214 1 approver.go:230] Finished syncing CSR csr-2nrjr for unknown node in 78.092µs\nI1205 10:37:07.226595 1 recorder.go:104] \"CSR \\\"csr-fbdb2\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-fbdb2\"} reason=\"CSRApproved\"\nI1205 10:37:07.232817 1 approver.go:230] Finished syncing CSR csr-fbdb2 for master-0 node in 6.564967ms\nI1205 10:37:07.232910 1 approver.go:230] Finished syncing CSR csr-fbdb2 for unknown node in 46.551µs\nI1205 10:37:07.242140 1 approver.go:230] Finished syncing CSR csr-fbdb2 for unknown node in 53.871µs\nE1205 10:38:49.877666 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded, falling back to slow path\nE1205 10:39:04.877493 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI1205 10:39:04.877588 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE1205 10:39:19.878529 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nF1205 10:39:19.878700 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2025-12-05T10:36:54Z","finishedAt":"2025-12-05T10:39:19Z","containerID":"cri-o://5674d03e599731519f29f243f076ae28159025706182191e04e4bbfef0819512"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","containerID":"cri-o://75e16cb5a0af404fec070efd073424497756db4fbc0649e23d5c8b08a868d67f","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-wg9zq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2025-12-05T10:36:54Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3e65409fc2b27ad0aaeb500a39e264663d2980821f099b830b551785ce4ce8b","containerID":"cri-o://a7e1b69ed43ea60bd1d549f53fbdffb3c63ba4aa5f33456e1b6e9ca137681118","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-wg9zq","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001513615114533301026253 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"7183807e-a042-4374-9dde-4419929fd54e","resourceVersion":"4550","creationTimestamp":"2025-12-05T10:36:11Z","annotations":{"kubernetes.io/config.hash":"3169f44496ed8a28c6d6a15511ab0eec","kubernetes.io/config.mirror":"3169f44496ed8a28c6d6a15511ab0eec","kubernetes.io/config.seen":"2025-12-05T10:35:18.636656125Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"ea73023b-75de-4456-80a9-4718aa8e39ac","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:39Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-05T10:37:39Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2025-12-05T10:35:23Z","finishedAt":"2025-12-05T10:35:23Z","containerID":"cri-o://2a995b4c36846fd814a8f2ca3bd01eb60eaabd9a004a171a036b25b030f63eff"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://2a995b4c36846fd814a8f2ca3bd01eb60eaabd9a004a171a036b25b030f63eff","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2025-12-05T10:36:11Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W1205 10:35:45.151676 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI1205 10:35:45.151926 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE1205 10:35:45.153144 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2025-12-05T10:35:45Z","finishedAt":"2025-12-05T10:35:45Z","containerID":"cri-o://c4c2663f7fd33f4762e4466ae563543a600762863049b80576e8bb073c24bbd0"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://3a88ca4d52cee88aa8dcb914ea7d8cff8936f823056376f936c3da2aa8e9a481","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-8649c48786-cgt5x.json0000640000000000000000000002431315114533301025210 0ustar0000000000000000{"metadata":{"name":"ingress-operator-8649c48786-cgt5x","generateName":"ingress-operator-8649c48786-","namespace":"openshift-ingress-operator","uid":"22676fac-b770-4937-9bee-7478bd1babb7","resourceVersion":"8857","creationTimestamp":"2025-12-05T10:35:55Z","labels":{"name":"ingress-operator","pod-template-hash":"8649c48786"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.9/23\"],\"mac_address\":\"0a:58:0a:80:00:09\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.9/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.9\"\n ],\n \"mac\": \"0a:58:0a:80:00:09\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-8649c48786","uid":"bcd6d90a-95b1-477c-a130-b7735862236c","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-vkqz7","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-vkqz7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-vkqz7","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:57Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.9","podIPs":[{"ip":"10.128.0.9"}],"startTime":"2025-12-05T10:37:08Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2025-12-05T10:40:28Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"m the watch stream: context canceled\") has prevented the request from succeeding\nW1205 10:40:27.775929 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNSRecord ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW1205 10:40:27.775981 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DaemonSet ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW1205 10:40:27.776035 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Deployment ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW1205 10:40:27.776081 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.DNSRecord ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2025-12-05T10:40:27.777Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2025-12-05T10:40:27.778Z\tINFO\toperator.main\truntime/asm_amd64.s:1695\tfile watch events channel closed\n2025-12-05T10:40:27.778Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"[failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route, failed waiting for all runnables to end within grace period of 30s: context deadline exceeded]\", \"errorCauses\": [{\"error\": \"failed to wait for route_metrics_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}, {\"error\": \"failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\"}]}\n","startedAt":"2025-12-05T10:37:56Z","finishedAt":"2025-12-05T10:40:27Z","containerID":"cri-o://7f5edea6bac7d86c19774c19407fa60083727d4b313c43d3272af6d979af6367"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b","containerID":"cri-o://01ddc03289ad66f2a901b27cad793faf8cd47f3f421b8573890f1eb86f36b80a","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-vkqz7","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-05T10:37:57Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://fd72b02943eacc00b1f17176da63bcc9ef38606a44cb5938204aea07936c36c7","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-vkqz7","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-controller-manager-operator-6c8676f99d-cwvk5.json0000640000000000000000000001661415114533301033543 0ustar0000000000000000config/pod/openshift-controller-manager-operator{"metadata":{"name":"openshift-controller-manager-operator-6c8676f99d-cwvk5","generateName":"openshift-controller-manager-operator-6c8676f99d-","namespace":"openshift-controller-manager-operator","uid":"1e69ce9e-4e6f-4015-9ba6-5a7942570190","resourceVersion":"9075","creationTimestamp":"2025-12-05T10:35:54Z","labels":{"app":"openshift-controller-manager-operator","pod-template-hash":"6c8676f99d"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"nonroot-v2","openshift.io/scc":"nonroot-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-controller-manager-operator-6c8676f99d","uid":"044a6184-db14-4568-9f0c-d0ff698f6d3a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"openshift-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access-7wfsv","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"openshift-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8eabac819f289e29d75c7ab172d8124554849a47f0b00770928c3eb19a5a31c4","command":["cluster-openshift-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.29"},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eddedae7578d79b5a3f748000ae5c00b9f14a04710f9f9ec7b52fc569be5dfb8"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.29"},{"name":"ROUTE_CONTROLLER_MANAGER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c416b201d480bddb5a4960ec42f4740761a1335001cf84ba5ae19ad6857771b1"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7wfsv","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-controller-manager-operator","serviceAccount":"openshift-controller-manager-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c15"},"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:37Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:39Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:39Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2025-12-05T10:37:08Z","containerStatuses":[{"name":"openshift-controller-manager-operator","state":{"running":{"startedAt":"2025-12-05T10:40:38Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"I1205 10:38:52.757619 1 cmd.go:253] Using service-serving-cert provided certificates\nI1205 10:38:52.758139 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI1205 10:38:52.758665 1 observer_polling.go:159] Starting file observer\nW1205 10:39:52.765876 1 builder.go:272] unable to get owner reference (falling back to namespace): the server was unable to return a response in the time allotted, but may still be processing the request (get pods openshift-controller-manager-operator-6c8676f99d-cwvk5)\nI1205 10:39:52.766068 1 builder.go:304] openshift-controller-manager-operator version 4.18.0-202511181540.p2.gf1711cf.assembly.stream.el9-f1711cf-f1711cf30f683ec0eaa187cd5168caae9e8c1254\nF1205 10:40:22.924799 1 cmd.go:182] failed checking apiserver connectivity: Get \"https://172.30.0.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-controller-manager-operator/leases/openshift-controller-manager-operator-lock\": context deadline exceeded\n","startedAt":"2025-12-05T10:38:52Z","finishedAt":"2025-12-05T10:40:22Z","containerID":"cri-o://ded2f19eb6b7e89481ac839fb3ba5dd47ee60cff52debe8dba17401c93d0ac1a"}},"ready":true,"restartCount":2,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8eabac819f289e29d75c7ab172d8124554849a47f0b00770928c3eb19a5a31c4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:8eabac819f289e29d75c7ab172d8124554849a47f0b00770928c3eb19a5a31c4","containerID":"cri-o://d0b2387ade5d83c28cb46bd5046a2e7e9827bca1562cdef34ea49ce95346e6a9","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-7wfsv","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-storage-operator/csi-snapshot-controller-6b958b6f94-lgn6v.json0000640000000000000000000001670215114533301030311 0ustar0000000000000000{"metadata":{"name":"csi-snapshot-controller-6b958b6f94-lgn6v","generateName":"csi-snapshot-controller-6b958b6f94-","namespace":"openshift-cluster-storage-operator","uid":"e27c0798-ec1c-43cd-b81b-f77f2f11ad0f","resourceVersion":"9010","creationTimestamp":"2025-12-05T10:37:37Z","labels":{"app":"csi-snapshot-controller","pod-template-hash":"6b958b6f94"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.26/23\"],\"mac_address\":\"0a:58:0a:80:00:1a\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.26/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.26\"\n ],\n \"mac\": \"0a:58:0a:80:00:1a\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"csi-snapshot-controller-6b958b6f94","uid":"f8bdae8c-1f43-42ad-a429-de4c78641f73","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"kube-api-access-ml74w","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"snapshot-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d3ce2cbf1032ad0f24f204db73687002fcf302e86ebde3945801c74351b64576","args":["--v=2","--leader-election=true","--leader-election-lease-duration=137s","--leader-election-renew-deadline=107s","--leader-election-retry-period=26s","--leader-election-namespace=openshift-cluster-storage-operator"],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"kube-api-access-ml74w","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000150000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"csi-snapshot-controller","serviceAccount":"csi-snapshot-controller","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c9"},"runAsNonRoot":true,"fsGroup":1000150000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"app":"csi-snapshot-controller"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:40Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:37Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:32Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:32Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:37:37Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.26","podIPs":[{"ip":"10.128.0.26"}],"startTime":"2025-12-05T10:37:37Z","containerStatuses":[{"name":"snapshot-controller","state":{"running":{"startedAt":"2025-12-05T10:40:31Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"ler-leader\nI1205 10:37:51.146751 1 leader_election.go:184] \"became leader, starting\"\nI1205 10:37:51.150880 1 snapshot_controller_base.go:255] Starting snapshot controller\nI1205 10:37:51.152379 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI1205 10:37:51.153758 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI1205 10:37:51.155877 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotClass from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI1205 10:37:51.156251 1 reflector.go:368] Caches populated for *v1.VolumeSnapshot from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI1205 10:37:51.156461 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160\nI1205 10:37:51.156785 1 reflector.go:368] Caches populated for *v1.VolumeSnapshotContent from github.com/kubernetes-csi/external-snapshotter/client/v8/informers/externalversions/factory.go:142\nI1205 10:37:51.157012 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160\nE1205 10:39:17.229355 1 leaderelection.go:429] Failed to update lock optimitically: Timeout: request did not complete within requested timeout - context deadline exceeded, falling back to slow path\nE1205 10:40:17.232718 1 leaderelection.go:436] error retrieving resource lock openshift-cluster-storage-operator/snapshot-controller-leader: the server was unable to return a response in the time allotted, but may still be processing the request (get leases.coordination.k8s.io snapshot-controller-leader)\nI1205 10:40:30.223317 1 leaderelection.go:297] failed to renew lease openshift-cluster-storage-operator/snapshot-controller-leader: timed out waiting for the condition\nE1205 10:40:30.223602 1 leader_election.go:188] \"Stopped leading\"\n","startedAt":"2025-12-05T10:37:50Z","finishedAt":"2025-12-05T10:40:30Z","containerID":"cri-o://4308a58237214eca1f5ba917e53d41b87b4e41bf19760a2305217ef9ccb8ed3f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d3ce2cbf1032ad0f24f204db73687002fcf302e86ebde3945801c74351b64576","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d3ce2cbf1032ad0f24f204db73687002fcf302e86ebde3945801c74351b64576","containerID":"cri-o://c81ba72a2f308c68cd7463f96c3158dfa0931cd098959c3eb1d285e9ee7a63b6","started":true,"volumeMounts":[{"name":"kube-api-access-ml74w","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-catalogd/catalogd-controller-manager-7cc89f4c4c-lth87.json0000640000000000000000000002540315114533301025727 0ustar0000000000000000{"metadata":{"name":"catalogd-controller-manager-7cc89f4c4c-lth87","generateName":"catalogd-controller-manager-7cc89f4c4c-","namespace":"openshift-catalogd","uid":"a4fd453c-e667-4bdc-aa9e-3d95ff707200","resourceVersion":"9072","creationTimestamp":"2025-12-05T10:38:08Z","labels":{"control-plane":"catalogd-controller-manager","pod-template-hash":"7cc89f4c4c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.40/23\"],\"mac_address\":\"0a:58:0a:80:00:28\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.40/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.40\"\n ],\n \"mac\": \"0a:58:0a:80:00:28\",\n \"default\": true,\n \"dns\": {}\n}]","kubectl.kubernetes.io/default-container":"manager","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"catalogd-controller-manager-7cc89f4c4c","uid":"452a357f-d41d-4cbc-9ab7-3e8c414df241","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cache","emptyDir":{}},{"name":"catalogserver-certs","secret":{"secretName":"catalogserver-cert","items":[{"key":"tls.crt","path":"tls.crt"},{"key":"tls.key","path":"tls.key"}],"defaultMode":420,"optional":false}},{"name":"ca-certs","projected":{"sources":[{"configMap":{"name":"catalogd-trusted-ca-bundle","items":[{"key":"ca-bundle.crt","path":"ca-bundle.crt"}],"optional":false}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"optional":false}}],"defaultMode":420}},{"name":"etc-containers","hostPath":{"path":"/etc/containers","type":"Directory"}},{"name":"etc-docker","hostPath":{"path":"/etc/docker","type":"Directory"}},{"name":"kube-api-access-kmhhw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","args":["--secure-listen-address=0.0.0.0:7443","--http2-disable","--upstream=http://127.0.0.1:8080/","--logtostderr=true","--v=2"],"ports":[{"name":"https","containerPort":7443,"protocol":"TCP"}],"resources":{"requests":{"cpu":"5m","memory":"64Mi"}},"volumeMounts":[{"name":"kube-api-access-kmhhw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}},{"name":"manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","command":["./manager"],"args":["--leader-elect","--metrics-bind-address=127.0.0.1:8080","--external-address=catalogd-service.openshift-catalogd.svc","--tls-cert=/var/certs/tls.crt","--tls-key=/var/certs/tls.key","--v=2","--global-pull-secret=openshift-config/pull-secret"],"env":[{"name":"SSL_CERT_DIR","value":"/var/ca-certs"}],"resources":{"requests":{"cpu":"100m","memory":"200Mi"}},"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","readOnly":true,"mountPath":"/var/ca-certs"},{"name":"etc-containers","readOnly":true,"mountPath":"/etc/containers"},{"name":"etc-docker","readOnly":true,"mountPath":"/etc/docker"},{"name":"kube-api-access-kmhhw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":15,"timeoutSeconds":1,"periodSeconds":20,"successThreshold":1,"failureThreshold":3},"readinessProbe":{"httpGet":{"path":"/readyz","port":8081,"scheme":"HTTP"},"initialDelaySeconds":5,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":10,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"catalogd-controller-manager","serviceAccount":"catalogd-controller-manager","nodeName":"master-0","securityContext":{"seLinuxOptions":{"type":"spc_t"},"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchExpressions":[{"key":"kubernetes.io/arch","operator":"In","values":["amd64","arm64","ppc64le","s390x"]},{"key":"kubernetes.io/os","operator":"In","values":["linux"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:08Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:40:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:08Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.40","podIPs":[{"ip":"10.128.0.40"}],"startTime":"2025-12-05T10:38:08Z","containerStatuses":[{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2025-12-05T10:38:14Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843","containerID":"cri-o://08630bfb9ddeb1f85d444e0d89244867195f7b2cfb10ecc8ec97020808d3e73c","started":true,"volumeMounts":[{"name":"kube-api-access-kmhhw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"manager","state":{"running":{"startedAt":"2025-12-05T10:40:29Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"=\"517d8e59-b5ed-4f05-9b3f-aa9ec42a81a0\"\nI1205 10:40:24.173460 1 clustercatalog_controller.go:208] \"unpack required: no cached catalog metadata found for this catalog\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"517d8e59-b5ed-4f05-9b3f-aa9ec42a81a0\"\nI1205 10:40:24.173840 1 main.go:250] \"using available authentication information for pulling image\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"517d8e59-b5ed-4f05-9b3f-aa9ec42a81a0\"\nI1205 10:40:27.631939 1 containers_image.go:147] \"pulled image\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"517d8e59-b5ed-4f05-9b3f-aa9ec42a81a0\" ref=\"registry.redhat.io/redhat/redhat-operator-index:v4.18\" digest=\"sha256:15adb3b2133604b064893f8009a74145e4c8bb5b134d111346dcccbdd2aa9bc2\"\nI1205 10:40:27.632885 1 containers_image.go:299] \"unpacking image\" logger=\"catalogd-controller\" controller=\"clustercatalog\" controllerGroup=\"olm.operatorframework.io\" controllerKind=\"ClusterCatalog\" ClusterCatalog=\"openshift-redhat-operators\" namespace=\"\" name=\"openshift-redhat-operators\" reconcileID=\"517d8e59-b5ed-4f05-9b3f-aa9ec42a81a0\" path=\"/var/cache/unpack/openshift-redhat-operators/sha256:15adb3b2133604b064893f8009a74145e4c8bb5b134d111346dcccbdd2aa9bc2\"\nI1205 10:40:28.267285 1 leaderelection.go:297] failed to renew lease openshift-catalogd/catalogd-operator-lock: timed out waiting for the condition\nE1205 10:40:28.267408 1 main.go:351] \"problem running manager\" err=\"leader election lost\" logger=\"setup\"\n","startedAt":"2025-12-05T10:38:15Z","finishedAt":"2025-12-05T10:40:28Z","containerID":"cri-o://2e9155fd74fd1d13dcef2794db107599bb6fa96cc533e3303f4bbbfdbd8c0208"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3f0aa9cd04713acc5c6fea721bd849e1500da8ae945e0b32000887f34d786e0b","containerID":"cri-o://eaa0a2bfed5203d2ab62ebaff09a1a3afca45eb5d5bdd915133bd4c75546ae0e","started":true,"volumeMounts":[{"name":"cache","mountPath":"/var/cache/"},{"name":"catalogserver-certs","mountPath":"/var/certs"},{"name":"ca-certs","mountPath":"/var/ca-certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-containers","mountPath":"/etc/containers","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-docker","mountPath":"/etc/docker","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-kmhhw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}aggregated/unused_machine_configs_count.json0000640000000000000000000000004115114533301020123 0ustar0000000000000000{"unused_machineconfigs_count":9}config/pod/openshift-cluster-version/cluster-version-operator-6d5d5dcc89-27xm6.json0000640000000000000000000001342015114533301026655 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-6d5d5dcc89-27xm6","generateName":"cluster-version-operator-6d5d5dcc89-","namespace":"openshift-cluster-version","uid":"1fd0a349-0f66-4c85-95e4-8bbc96648c05","resourceVersion":"6897","creationTimestamp":"2025-12-05T10:38:14Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"6d5d5dcc89"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-6d5d5dcc89","uid":"027780e6-17a7-4292-b1a8-7f6a5d9b05cd","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:15Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:14Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:15Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:15Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2025-12-05T10:38:14Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2025-12-05T10:38:14Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2025-12-05T10:38:14Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","containerID":"cri-o://465abd54a7076d7b78aa23778511467ea5203eaf00e16f71acec306b149b36f4","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415114533301011016 0ustar0000000000000000de1b509e-495a-45ab-9c55-5f094361bb63config/version.json0000640000000000000000000000714415114533301013067 0ustar0000000000000000{"metadata":{"name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","resourceVersion":"9565","generation":2,"creationTimestamp":"2025-12-05T10:31:28Z"},"spec":{"clusterID":"de1b509e-495a-45ab-9c55-5f094361bb63","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.29","image":"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","url":"https://access.redhat.com/errata/RHBA-2025:21797","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","fast-4.19","fast-4.20","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2025-12-05T10:31:51Z","completionTime":null,"version":"4.18.29","image":"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572","verified":false}],"observedGeneration":2,"versionHash":"PLBD6Tt9bD0=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2025-12-05T10:31:51Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2025-12-05T10:31:51Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2025-12-05T10:31:51Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2025-12-05T10:31:51Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.29\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:8c885ea0b3c5124989f0a9b93eba98eb9fca6bbd0262772d85d90bf713a4d572\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2025-12-05T10:31:51Z"},{"type":"Failing","status":"True","lastTransitionTime":"2025-12-05T10:40:48Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, baremetal, cloud-controller-manager, cluster-autoscaler, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-config, monitoring, openshift-apiserver, openshift-samples, operator-lifecycle-manager-packageserver, storage are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 906): the server is down or not responding\n* Could not update oauthclient \"console\" (550 of 906): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (823 of 906): resource may have been deleted\n* Could not update role \"openshift-console/prometheus-k8s\" (827 of 906): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-05T10:31:51Z","reason":"MultipleErrors","message":"Unable to apply 4.18.29: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/clusteroperator/storage.json0000640000000000000000000000131215114533301016272 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"0cde1841-a70d-4d66-8b57-f50c37f0c7ed","resourceVersion":"822","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315114533301016652 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"9d3209e6-1113-4b31-945f-5d33a06c0bab","resourceVersion":"4693","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:37:43Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:37:39Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:39Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000307615114533301024657 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"286e1b96-7a49-411a-956f-c27b7d0727c2","resourceVersion":"8960","generation":1,"creationTimestamp":"2025-12-05T10:31:52Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:38:13Z"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-05T10:38:13Z","reason":"ClusterServiceVersionNotSucceeded","message":"ClusterServiceVersion openshift-operator-lifecycle-manager/packageserver observed in phase Failed with reason: NoOperatorGroup, message: csv in namespace with no operatorgroups"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-05T10:40:31Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:38:14Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255415114533301023447 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"115749d8-c38d-4e44-ab3d-df36282665c9","resourceVersion":"9393","generation":1,"creationTimestamp":"2025-12-05T10:31:52Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:40:49Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-05T10:40:49Z","message":"Deployed 4.18.0-202511181540.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:40:49Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:40:49Z"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"operator-lifecycle-manager","version":"4.18.0-202511181540.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115114533301022034 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"88282011-964e-4df6-a42e-090661c70daf","resourceVersion":"6759","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:38:14Z","message":"Deployed 4.18.0-202511181540.p2.g357bb13.assembly.stream.el9-357bb13"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:38:14Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:38:14Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:38:14Z"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"operator-lifecycle-manager","version":"4.18.0-202511181540.p2.g357bb13.assembly.stream.el9-357bb13"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315114533301020276 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"913dfe8f-76c2-4beb-9089-95618d65f16e","resourceVersion":"825","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000377215114533301022432 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"64609d10-2f73-4e17-8a99-cc54da68ebdf","resourceVersion":"7150","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-05T10:37:43Z","reason":"_DesiredStateNotYetAchieved","message":"Progressing: deployment/controller-manager: observed generation is 4, desired generation is 5.\nProgressing: deployment/route-controller-manager: observed generation is 2, desired generation is 3."},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:38:20Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:43Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215114533301020630 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"9504d9a3-58fe-4402-8b47-f90f7d99ae71","resourceVersion":"8443","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:38:24Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.34:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.34:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"openshift-apiserver","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420415114533301015421 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"d6877d3e-014a-47e2-b416-3edf88bdce12","resourceVersion":"9157","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:58Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:40:44Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:40:44Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:58Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:58Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115114533301017060 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"a7ff1d0c-cdf5-47ff-8bb4-e311ae81a059","resourceVersion":"5520","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:37:51Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.29\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:37:53Z","reason":"AsExpected","message":"Cluster version is \"4.18.29\""},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:51Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.29"},{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003614315114533301016331 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"051365bd-806a-4754-97f6-efd952495a47","resourceVersion":"6301","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2025-12-05T10:36:19Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:36:08Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:36:08Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:38:02Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:37:37Z"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715114533301017024 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"ed1ec654-7d23-4621-915e-ea39e9204146","resourceVersion":"6182","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2025-12-05T10:38:01Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2025-12-05T10:38:01Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-05T10:38:01Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:38:01Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315114533301017121 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"b6f2f97a-93c6-4533-8676-b42acd7cfe39","resourceVersion":"6241","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:38:02Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.29"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:38:02Z","reason":"OperatorAvailable","message":"Available release version: 4.18.29"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:38:02Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:38:02Z","reason":"OperatorAvailable","message":"Available release version: 4.18.29"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015114533301017473 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"86f554dc-8ac8-4ff0-8dd2-fa61a3048af6","resourceVersion":"810","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215114533301020073 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"82fbbee1-e2ee-4d0f-8483-571d9b7df431","resourceVersion":"8843","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:40:28Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.29"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:40:28Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:40:28Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:40:28Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371315114533301017010 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"93aaa644-92b7-4211-a3cc-fa8bd0ee4d18","resourceVersion":"9652","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:41:04Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:41:04Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:41:04Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:41:04Z"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315114533301022531 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"a6dd0670-d6dc-4642-9fc0-7d01e29a07b8","resourceVersion":"8987","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:37:47Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:37:47Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615114533301017541 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"a69fa3ce-4189-4c8b-9163-6a04c3f998f5","resourceVersion":"6938","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-05T10:37:51Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715114533301021362 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"9a5f54d9-84d1-49ca-a927-7cd8b795454b","resourceVersion":"9079","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-05T10:38:20Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-05T10:37:40Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715114533301017567 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"8f2dead8-9755-4646-86e5-17c5edf62f45","resourceVersion":"6966","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:31Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-05T10:38:17Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-05T10:37:33Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:31Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2025-12-05T10:37:31Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000534015114533301016463 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"5858be9a-1436-4576-8468-42f08b1df250","resourceVersion":"9663","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:41:04Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"Unknown","lastTransitionTime":"2025-12-05T10:41:04Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:41:04Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2025-12-05T10:41:04Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:41:04Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2025-12-05T10:41:04Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2025-12-05T10:41:04Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"Unknown","lastTransitionTime":"2025-12-05T10:41:04Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:41:04Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000456715114533301016317 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"f1637a9c-9f55-445e-afb4-43949f9e9269","resourceVersion":"5985","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:37:58Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-05T10:37:57Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:58Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:57Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2025-12-05T10:37:57Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2b3d313c599852b3543ee5c3a62691bd2d1bbad12c2e1c610cd71a1dec6eea32"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:831f30660844091d6154e2674d3a9da6f34271bf8a2c40b56f7416066318742b"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715114533301017564 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"599df7f1-08a7-46e1-bdba-e3254686e391","resourceVersion":"806","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000457015114533301015556 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"08da663f-e2d8-46dc-a29f-8a60a26f61dc","resourceVersion":"5636","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"EtcdMembersControllerDegraded: giving up getting a cached client after 3 tries\nClusterMemberRemovalControllerDegraded: IsBootstrapComplete failed to determine bootstrap status: IsBootstrapComplete couldn't list the etcd cluster members: giving up getting a cached client after 3 tries\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nNodeControllerDegraded: All master nodes are ready\nClusterMemberControllerDegraded: could not get list of unhealthy members: giving up getting a cached client after 3 tries"},{"type":"Progressing","status":"True","lastTransitionTime":"2025-12-05T10:37:55Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-05T10:37:40Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515114533301015426 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"58b4e796-979a-46da-880a-d13b7ebe42c9","resourceVersion":"9183","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:40:45Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:40:45Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:40:45Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:57Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:eb928c13a46d3fb45f4a881892d023a92d610a5430be0ffd916aaf8da8e7d297"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:79f99fd6cce984287932edf0d009660bb488d663081f3d62ec3b23bc8bfbf6c2"},{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c69ffd8f8dcceedc2d6eb306cea33f8beabc1be1308cd5f4ee8b9a8e3eab9843"},{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715114533301021430 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"6e6d4dc5-09d3-4aa7-8897-e1b68e2adaec","resourceVersion":"8933","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:37:51Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:37:51Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"csi-snapshot-controller","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515114533301021607 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"0a8320a3-9df0-488d-823a-853901ecc5b4","resourceVersion":"8623","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:38:31Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:38:31Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:38:31Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:38:31Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215114533301016270 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"90c82f29-d791-4a77-a952-18f3c3abce2e","resourceVersion":"828","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615114533301017730 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"401e74f0-a300-483d-97dd-3cd8941ee94a","resourceVersion":"5095","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:47Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:37:47Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:37:47Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:47Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:47Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"feature-gates","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000265715114533301020464 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"7f1efbf0-3e09-440a-b8bb-1f8eaf94c70d","resourceVersion":"9661","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:41:03Z","reason":"AsExpected","message":"at version 4.18.29"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:41:04Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:41:04Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:41:03Z"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000001520715114533301020054 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"cfdf02f5-b2e7-464c-a323-83a95808c910","resourceVersion":"1953","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:32:07Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:32:07Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:32:07Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:32:07Z"}],"versions":[{"name":"operator","version":""}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000173715114533301021540 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"66f3ff24-a0b6-45bd-a131-88a3425c0584","resourceVersion":"781","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015114533301016570 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"0dcca24b-80d1-4b25-aabd-607e07672f6a","resourceVersion":"9613","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:41:03Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:41:03Z"},{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:41:03Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:41:03Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2025-12-05T10:41:03Z"}],"versions":[{"name":"operator","version":"4.18.29"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000772615114533301017664 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"43d44bc9-e694-44e4-a0f7-f6f232d50a60","resourceVersion":"7314","generation":1,"creationTimestamp":"2025-12-05T10:31:51Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.40.48:443/healthz\": dial tcp 172.30.40.48:443: connect: connection refused\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2025-12-05T10:38:21Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.38:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.38:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.40.48:443/healthz\": dial tcp 172.30.40.48:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2025-12-05T10:37:38Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.29"},{"name":"oauth-apiserver","version":"4.18.29"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515114533301023211 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115114533301025421 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715114533301025130 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715114533301025121 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000030315114533301022241 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515114533301026675 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115114533301023400 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115114533301023174 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115114533301025464 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615114533301027472 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"9985b508-e348-4358-861d-b3d12aed0179","resourceVersion":"6446","generation":2,"creationTimestamp":"2025-12-05T10:38:08Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315114533301023436 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"5a4f4383-2bb1-41d7-b4f7-9e06cd4a3858","resourceVersion":"3961","generation":1,"creationTimestamp":"2025-12-05T10:37:37Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015114533301022041 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"83e57192-f08d-43a2-b278-38803845b9a9","resourceVersion":"3943","generation":1,"creationTimestamp":"2025-12-05T10:37:37Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"NamesAccepted","status":"True","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"},{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2025-12-05T10:37:37Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/proxy.json0000640000000000000000000000031315114533301012552 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"cc60dea4-d5b2-48e1-a399-ab00a79efba3","resourceVersion":"565","generation":1,"creationTimestamp":"2025-12-05T10:31:24Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/ingress.json0000640000000000000000000000043615114533301013051 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"21f02496-35cf-4b1f-bd5a-5fa4b84a878e","resourceVersion":"562","generation":1,"creationTimestamp":"2025-12-05T10:31:23Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/featuregate.json0000640000000000000000000000613615114533301013676 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"4e3d1a40-bc1a-48d9-997a-30b56781906c","resourceVersion":"655","generation":1,"creationTimestamp":"2025-12-05T10:31:44Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.29","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115114533301025270 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"b8e5bf39-2c5e-43f7-88e0-491c28dd36f7","resourceVersion":"4685","generation":2,"creationTimestamp":"2025-12-05T10:32:19Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515114533301026727 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"6b022782-31a7-44f8-9b50-f075c3fef704","resourceVersion":"7004","generation":1,"creationTimestamp":"2025-12-05T10:38:17Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"9a4a964c-76a7-4ffe-9157-a7d58f1c9b32","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715114533301024015 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"bb3e4eda-43cc-493a-9869-db568d9a2f57","resourceVersion":"4686","generation":2,"creationTimestamp":"2025-12-05T10:36:21Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"9a4a964c-76a7-4ffe-9157-a7d58f1c9b32","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537215114533301030627 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"a76f01d7-0f5e-48cf-855b-7b5837338cb8","resourceVersion":"9240","generation":2,"creationTimestamp":"2025-12-05T10:40:47Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115114533301032100 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"f74255c3-b693-454b-8d2d-7d65b56bfc0e","resourceVersion":"9625","generation":2,"creationTimestamp":"2025-12-05T10:41:03Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102615114533301024765 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"30507886-8526-4c03-87b2-f726c9b3e89c","resourceVersion":"9611","generation":2,"creationTimestamp":"2025-12-05T10:41:03Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/node/master-0.json0000640000000000000000000000551415114533301013756 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"ea73023b-75de-4456-80a9-4718aa8e39ac","resourceVersion":"9030","creationTimestamp":"2025-12-05T10:35:53Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/remote-zone-migrated":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"16","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"49330228Ki","pods":"250"},"allocatable":{"cpu":"15500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"48179252Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2025-12-05T10:40:34Z","lastTransitionTime":"2025-12-05T10:35:53Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2025-12-05T10:40:34Z","lastTransitionTime":"2025-12-05T10:35:53Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2025-12-05T10:40:34Z","lastTransitionTime":"2025-12-05T10:35:53Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2025-12-05T10:40:34Z","lastTransitionTime":"2025-12-05T10:37:08Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.100.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202511170715-0","containerRuntimeVersion":"cri-o://1.31.13-2.rhaos4.18.git15789b8.el9","kubeletVersion":"v1.31.13","kubeProxyVersion":"v1.31.13","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615114533301025474 0ustar0000000000000000{"metadata":{"name":"edit","uid":"87c0df24-120d-4477-96df-bd0ae6297160","resourceVersion":"9136","creationTimestamp":"2025-12-05T10:30:14Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315114533301025635 0ustar0000000000000000{"metadata":{"name":"admin","uid":"f2c34e4a-5772-431c-8554-d295a7d6f7eb","resourceVersion":"9128","creationTimestamp":"2025-12-05T10:30:14Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/authentication.json0000640000000000000000000000116415114533301014415 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"1acb03be-fc54-47d2-bd5c-87ad082700a2","resourceVersion":"978","generation":1,"creationTimestamp":"2025-12-05T10:31:55Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215114533301020170 0ustar0000000000000000[]config/oauth.json0000640000000000000000000000114415114533301012514 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"76860e8f-cd9a-4b55-aa99-795dc165421c","resourceVersion":"1345","generation":1,"creationTimestamp":"2025-12-05T10:32:05Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/machineconfigpools/worker.json0000640000000000000000000000106515114533301016556 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2025-12-05T10:40:50Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"9398","uid":"f852dc71-7802-4020-a977-5d74f76002fe"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117215114533301016537 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2025-12-05T10:40:50Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"9397","uid":"359d1708-bf74-403d-8e19-1bdcbcce9e1e"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115114533301027742 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"71f50358-110e-407d-ad67-027d7938ee93","resourceVersion":"5806","generation":1,"creationTimestamp":"2025-12-05T10:37:57Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2025-12-05T10:37:57Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2025-12-05T10:37:57Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2025-12-05T10:37:57Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2025-12-05T10:37:57Z","reason":"AsExpected"}]}}config/network.json0000640000000000000000000000117015114533301013064 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"138dc0ed-abed-49aa-bd1a-028be2d7d3e0","resourceVersion":"3219","generation":2,"creationTimestamp":"2025-12-05T10:31:23Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/image.json0000640000000000000000000000111715114533301012456 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"dc6724ee-bbde-48eb-9f73-d6963c12a2f4","resourceVersion":"1255","generation":1,"creationTimestamp":"2025-12-05T10:32:02Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}config/apiserver.json0000640000000000000000000000121615114533300013373 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"2834ad4e-0e07-4243-926e-b3d91cf9c1ef","resourceVersion":"833","generation":1,"creationTimestamp":"2025-12-05T10:31:52Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}config/infrastructure.json0000640000000000000000000000106515114533300014455 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"1da4cdcb-59bc-4e15-b94f-fe51346b4cf9","resourceVersion":"548","generation":1,"creationTimestamp":"2025-12-05T10:31:22Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/schedulers/cluster.json0000640000000000000000000000052415114533300015216 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"484e5d4b-71e3-4481-9700-3eebb4fe0626","resourceVersion":"572","generation":1,"creationTimestamp":"2025-12-05T10:31:25Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515114533300025113 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"c01157f3-0a08-4cfe-a92c-a9c7e89b2e31","resourceVersion":"9433","generation":1,"creationTimestamp":"2025-12-05T10:32:09Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"daaba366-e9a4-4b50-baa5-66bb033cd543","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2025-12-05T10:40:50Z","reason":"SufficientPods","message":""}]}}