insights-operator/gathers.json0000640000000000000000000003506015156522236015264 0ustar0000000000000000{"status_reports":[{"name":"clusterconfig/openshift_machine_api_events","duration_in_ms":51,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/monitoring_persistent_volumes","duration_in_ms":81,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ingress_certificates","duration_in_ms":210,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators_pods_and_events","duration_in_ms":16271,"records_count":61,"errors":["the record with the same name \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-hmbpl.json\" was already recorded and had the fingerprint \"25af020e5647fada970eb738f62f11febe7ea5d696766cca13843686ded6b839\", overwriting with the record having fingerprint \"25af020e5647fada970eb738f62f11febe7ea5d696766cca13843686ded6b839\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-hmbpl/etcd-operator_previous.log\" was already recorded and had the fingerprint \"3e462d02bcbdedf28ab88481b4aa17c380dafe56a1ae5fb965e6c97920169bee\", overwriting with the record having fingerprint \"3e462d02bcbdedf28ab88481b4aa17c380dafe56a1ae5fb965e6c97920169bee\"","the record with the same name \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-hmbpl/etcd-operator_current.log\" was already recorded and had the fingerprint \"20dc92c8aa4e2fa0d4db0e1142577d7ac8a495c187602bfa47eb068cf5c0f25a\", overwriting with the record having fingerprint \"20dc92c8aa4e2fa0d4db0e1142577d7ac8a495c187602bfa47eb068cf5c0f25a\""],"warnings":["warning: the record with the same fingerprint \"25af020e5647fada970eb738f62f11febe7ea5d696766cca13843686ded6b839\" was already recorded at path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-hmbpl.json\", recording another one with a different path \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-hmbpl.json\"","warning: the record with the same fingerprint \"3e462d02bcbdedf28ab88481b4aa17c380dafe56a1ae5fb965e6c97920169bee\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-hmbpl/etcd-operator_previous.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-hmbpl/etcd-operator_previous.log\"","warning: the record with the same fingerprint \"20dc92c8aa4e2fa0d4db0e1142577d7ac8a495c187602bfa47eb068cf5c0f25a\" was already recorded at path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-hmbpl/etcd-operator_current.log\", recording another one with a different path \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-hmbpl/etcd-operator_current.log\""],"panic":null},{"name":"workloads/workload_info","duration_in_ms":5630,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/version","duration_in_ms":153,"records_count":3,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/validating_webhook_configurations","duration_in_ms":168,"records_count":6,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/config_maps","duration_in_ms":172,"records_count":9,"errors":["configmaps \"cluster-monitoring-config\" not found","configmaps \"gateway-mode-config\" not found","configmaps \"insights-config\" not found"],"warnings":["warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\"","warning: the record with the same fingerprint \"34cdf5d36d45a9e3ee7c2be31546e3d937ae4ebf144ac07b0210c06a1610a94d\" was already recorded at path \"config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt\", recording another one with a different path \"config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt\""],"panic":null},{"name":"clusterconfig/openstack_dataplanedeployments","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/ceph_cluster","duration_in_ms":7,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/lokistack","duration_in_ms":47,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkstates","duration_in_ms":43,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/schedulers","duration_in_ms":97,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/olm_operators","duration_in_ms":16,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads/helmchart_info","duration_in_ms":40,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional","duration_in_ms":257,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/support_secret","duration_in_ms":6,"records_count":0,"errors":["secrets \"support\" not found"],"warnings":null,"panic":null},{"name":"clusterconfig/ingress","duration_in_ms":82,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/infrastructures","duration_in_ms":81,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/service_accounts","duration_in_ms":11609,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_controlplanes","duration_in_ms":6,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/tsdb_status","duration_in_ms":33,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/api/v1/status/tsdb\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/cost_management_metrics_configs","duration_in_ms":80,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/oauths","duration_in_ms":79,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/metrics","duration_in_ms":33,"records_count":0,"errors":["Get \"https://prometheus-k8s.openshift-monitoring.svc:9091/federate?match%5B%5D=cluster_installer\u0026match%5B%5D=namespace%3Acontainer_cpu_usage%3Asum\u0026match%5B%5D=namespace%3Acontainer_memory_usage_bytes%3Asum\u0026match%5B%5D=vsphere_node_hw_version_total\u0026match%5B%5D=virt_platform\u0026match%5B%5D=console_helm_installs_total\u0026match%5B%5D=console_helm_upgrades_total\u0026match%5B%5D=console_helm_uninstalls_total\u0026match%5B%5D=openshift_apps_deploymentconfigs_strategy_total\u0026match%5B%5D=etcd_server_slow_apply_total\u0026match%5B%5D=etcd_server_slow_read_indexes_total\u0026match%5B%5D=haproxy_exporter_server_threshold\": dial tcp: lookup prometheus-k8s.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/crds","duration_in_ms":100,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/authentication","duration_in_ms":9,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/dvo_metrics","duration_in_ms":43,"records_count":0,"errors":null,"warnings":["warning: no service found with label selector name=deployment-validation-operator"],"panic":null},{"name":"clusterconfig/nodes","duration_in_ms":43,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_registries","duration_in_ms":59,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/qemu_kubevirt_launcher_logs","duration_in_ms":79,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/clusterroles","duration_in_ms":104,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/node_logs","duration_in_ms":314,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/jaegers","duration_in_ms":3,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/pod_network_connectivity_checks","duration_in_ms":9,"records_count":0,"errors":["the server could not find the requested resource (get podnetworkconnectivitychecks.controlplane.operator.openshift.io)"],"warnings":null,"panic":null},{"name":"clusterconfig/machine_sets","duration_in_ms":46,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/remote_configuration","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openshift_logging","duration_in_ms":8,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_runtime_configs","duration_in_ms":43,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machines","duration_in_ms":88,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"conditional/rapid_container_logs","duration_in_ms":0,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_healthchecks","duration_in_ms":17,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_classes","duration_in_ms":81,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"workloads","duration_in_ms":5638,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image","duration_in_ms":4,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_autoscalers","duration_in_ms":19,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/certificate_signing_requests","duration_in_ms":82,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/overlapping_namespace_uids","duration_in_ms":153,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/container_images","duration_in_ms":163,"records_count":6,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/cluster_apiserver","duration_in_ms":48,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/aggregated_monitoring_cr_names","duration_in_ms":84,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_configs","duration_in_ms":87,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/operators","duration_in_ms":170,"records_count":34,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig","duration_in_ms":16330,"records_count":146,"errors":["function \"support_secret\" failed with an error","function \"pod_network_connectivity_checks\" failed with an error","function \"metrics\" failed with an error","function \"tsdb_status\" failed with an error","function \"active_alerts\" failed with an error","function \"silenced_alerts\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","function \"config_maps\" failed with an error","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-hmbpl.json\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-hmbpl/etcd-operator_previous.log\"","unable to record function \"operators_pods_and_events\" record \"config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-hmbpl/etcd-operator_current.log\""],"warnings":null,"panic":null},{"name":"clusterconfig/pdbs","duration_in_ms":78,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/mutating_webhook_configurations","duration_in_ms":110,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/feature_gates","duration_in_ms":70,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/machine_config_pools","duration_in_ms":99,"records_count":2,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/nodenetworkconfigurationpolicies","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_config","duration_in_ms":5,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_datahubs","duration_in_ms":41,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/proxies","duration_in_ms":43,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/storage_cluster","duration_in_ms":67,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/networks","duration_in_ms":45,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"conditional/conditional_gatherer_rules","duration_in_ms":0,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/sap_pods","duration_in_ms":4,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_version","duration_in_ms":3,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/image_pruners","duration_in_ms":44,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/install_plans","duration_in_ms":10875,"records_count":1,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/openstack_dataplanenodesets","duration_in_ms":14,"records_count":0,"errors":null,"warnings":null,"panic":null},{"name":"clusterconfig/active_alerts","duration_in_ms":95,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/silenced_alerts","duration_in_ms":97,"records_count":0,"errors":["Get \"https://alertmanager-main.openshift-monitoring.svc:9094/api/v2/alerts?active=false\u0026inhibited=false\u0026silenced=true\": dial tcp: lookup alertmanager-main.openshift-monitoring.svc on 172.30.0.10:53: no such host"],"warnings":null,"panic":null},{"name":"clusterconfig/number_of_pods_and_netnamespaces_with_sdn_annotations","duration_in_ms":171,"records_count":0,"errors":null,"warnings":null,"panic":null}],"container_memory_bytes_usage":0,"uptime_seconds":22.814,"is_global_obfuscation_enabled":false}insights-operator/remote-configuration.json0000640000000000000000000000443515156522236017771 0ustar0000000000000000{"conditional_gathering_rules":[{"conditions":[{"alert":{"name":"APIRemovedInNextEUSReleaseInUse"},"type":"alert_is_firing"}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedReload"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"AlertmanagerFailedToSendAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},{"conditions":[{"alert":{"name":"KubePodCrashLooping"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","previous":true,"tail_lines":20}}},{"conditions":[{"alert":{"name":"KubePodNotReady"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},{"conditions":[{"alert":{"name":"PrometheusOperatorSyncFailed"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},{"conditions":[{"alert":{"name":"PrometheusRemoteStorageFailures"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},{"conditions":[{"alert":{"name":"PrometheusTargetSyncFailure"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},{"conditions":[{"alert":{"name":"SamplesImagestreamImportFailing"},"type":"alert_is_firing"}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},{"conditions":[{"alert":{"name":"ThanosRuleQueueIsDroppingAlerts"},"type":"alert_is_firing"}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}}],"container_logs":[],"version":"1.2.0"}insights-operator/conditional-gatherer-rules.json0000640000000000000000000000577515156522236021073 0ustar0000000000000000{"version":"1.2.0","conditional_gathering_rules":[{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"APIRemovedInNextEUSReleaseInUse"}}],"gathering_functions":{"api_request_counts_of_resource_from_alert":{"alert_name":"APIRemovedInNextEUSReleaseInUse"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedReload"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedReload","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"AlertmanagerFailedToSendAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"AlertmanagerFailedToSendAlerts","container":"alertmanager","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodCrashLooping"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodCrashLooping","tail_lines":20,"previous":true}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"KubePodNotReady"}}],"gathering_functions":{"containers_logs":{"alert_name":"KubePodNotReady","tail_lines":100},"pod_definition":{"alert_name":"KubePodNotReady"}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusOperatorSyncFailed"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusOperatorSyncFailed","container":"prometheus-operator","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusRemoteStorageFailures"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusRemoteStorageFailures","container":"prometheus","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"PrometheusTargetSyncFailure"}}],"gathering_functions":{"containers_logs":{"alert_name":"PrometheusTargetSyncFailure","container":"prometheus","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"SamplesImagestreamImportFailing"}}],"gathering_functions":{"image_streams_of_namespace":{"namespace":"openshift-cluster-samples-operator"},"logs_of_namespace":{"namespace":"openshift-cluster-samples-operator","tail_lines":100}}},"errors":["alerts cache is missing"],"was_triggered":false},{"rule":{"conditions":[{"type":"alert_is_firing","alert":{"name":"ThanosRuleQueueIsDroppingAlerts"}}],"gathering_functions":{"containers_logs":{"alert_name":"ThanosRuleQueueIsDroppingAlerts","container":"thanos-ruler","tail_lines":50}}},"errors":["alerts cache is missing"],"was_triggered":false}],"endpoint":"https://console.redhat.com/api/gathering/v2/%s/gathering_rules"}config/workload_info.json0000640000000000000000000005502115156522236014247 0ustar0000000000000000{"pods":80,"imageCount":66,"namespaces":{"0LiT6ZNtbpYL":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"BuLIUMMJnyP_"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"Cl6kTzfbYztA"},{"imageID":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","firstCommand":"FC0eu9ID58Bm","firstArg":"47DEQpj8HBSa"}]}]},"0h5ohwdJx4S5":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"buSkac1OkQU4","firstArg":"XV1E-c-gSQmZ"}]}]},"2IqVYeidVUxV":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","firstCommand":"po5yju59c7HJ"}],"containers":[{"imageID":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","firstCommand":"UcO4la9rqCTe"}]}]},"43Xz0HbE9FHX":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:86833de447f25d1d0fc15ed5460c5068cc48b18b78b8108304c5b5fd1dff04ab","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:31180c161c4416e7c7d06d63571b814732d4ff11a14e2bfdcac0681ed14204ac","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","firstCommand":"4MEQ8E7-fUvu","firstArg":"mDEjdpyJDBZ4"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:898c67bf7fc973e99114f3148976a6c21ae0dbe413051415588fa9b995f5b331","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5EtL1wfFQLyo","firstArg":"_lK3daI6CUb2"},{"imageID":"sha256:491bd3a9c1f09106983d7c3b85f1c97c80dd582f8d1a10e6f6794bf430d7ac19","firstCommand":"_lK3daI6CUb2","firstArg":"1CqC9ME648jS"}],"containers":[{"imageID":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","firstCommand":"VDU_nFNG7OR_","firstArg":"JMRYz7RtmkVt"}]}]},"47HAKWqp7-jn":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"icTsn2s_EIax"},{"imageID":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","firstCommand":"N9KxLV2avCo2"}]}]},"4k7XyKW2A17e":{"count":1,"terminalCount":1,"shapes":[]},"5fn-sCitjq6a":{"count":3,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","firstCommand":"HgS-rIunFHfD","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","firstArg":"ESRPWfqdsWE1"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","firstArg":"zO0oxtw_mcI5"}]}]},"6KbiDGNUd_ub":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"6bLpdRMvgXVP":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"},{"imageID":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","firstCommand":"N9KxLV2avCo2","firstArg":"EbplhSJxzSTF"}]}]},"9dJB3pvMrhr8":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","firstCommand":"51QuNwyM-xYf","firstArg":"r7zEsGNvlNrk"}]}]},"AN3N38xANElq":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"},{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"5gS4z5mOnDuY"},{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"N9KxLV2avCo2","firstArg":"930btY2ohuPL"}]}]},"CMkFy_B6OMUO":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"r7zEsGNvlNrk"}]}]},"C_9an18W0cU6":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ZS9VAWJDvxuf","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"ArvlNzaZtYpC","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"PPJ_dAh1Wl4S","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","firstCommand":"5-ZY-7KtGiOe"}]}]},"EOB8Fqt74gVH":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"EyQn00UhCg7z":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"bsRjeCtd7lVU","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"ZDrZSWYe4Hpn"}]}]},"F-y2qosZEzxd":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","firstCommand":"7aQQEh6Tr2m7","firstArg":"gcNszUTvGLqr"}]}]},"ICyEPw5KVYuy":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","firstCommand":"ijLlFtdBW-Uk","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"N9KxLV2avCo2"}]}]},"KETRwZOPBpF9":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"buSkac1OkQU4","firstArg":"47DEQpj8HBSa"}]}]},"LBp1kjMRhgCD":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"MBms5agiSYKb":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","firstArg":"zO0oxtw_mcI5"}]}]},"N3z7Gdl4s2xN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","firstCommand":"vLhjmt4GJVrQ"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"NJ5StnkN7lNJ":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","firstCommand":"euUHIZmT1r6w"}]}]},"NuNApgGLWU3S":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"loDbMsNsNHAN"},{"imageID":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","firstCommand":"BWdk-C4p4WVi","firstArg":"ov8ZFLf4OaCu"}]}]},"QRCRK87Nh9-g":{"count":2,"terminalCount":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"N9KxLV2avCo2","firstArg":"aC8iSHmKHojh"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"Yfg8wToYnj2U"}]}]},"QhwI_DkC7RkW":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","firstCommand":"N9KxLV2avCo2"}]}]},"RGIC92MKxXzi":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:cdd28dfe7132e19af9f013f72cf120d970bc31b6b74693af262f8d2e82a096e1","firstCommand":"RxKEaTc90uWM","firstArg":"r7zEsGNvlNrk"}]}]},"WPOX0dN4tqDv":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","firstCommand":"9RqZYN0XQJuD"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"47DEQpj8HBSa"}]}]},"XStfgPOmHYzB":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","firstCommand":"AiycEq1CClLy","firstArg":"r7zEsGNvlNrk"}]}]},"YgQZCjyI6D9c":{"count":1,"terminalCount":1,"shapes":[]},"cMIdS73ad1cT":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","firstCommand":"09D_XsQaIohy","firstArg":"r7zEsGNvlNrk"}]}]},"cWNZj9dm5f4i":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","firstCommand":"WFJEBSInAJpw","firstArg":"r7zEsGNvlNrk"}]}]},"coRkJ8lvmtSk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"}]}]},"de1zmznD1F_L":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","firstCommand":"rb3iLnl9GmZR","firstArg":"r7zEsGNvlNrk"}]}]},"eCjF12pGOLUF":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:112a03f2411f871cdaca5f20daef71024dac710113d5f30897117a5a02f6b6f5","firstCommand":"N9KxLV2avCo2"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]}]},"ecUe5cl6bPwX":{"count":4,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","firstCommand":"pgaYl1gqTV2L","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","firstCommand":"kwBOP3_4oVMx","firstArg":"47DEQpj8HBSa"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","firstCommand":"buSkac1OkQU4","firstArg":"gcNszUTvGLqr"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:de91abd5ad76fb491881a75a0feb4b8ca5600ceb5e15a4b0b687ada01ea0a44c","firstCommand":"Tt12uskXp-TN","firstArg":"zO0oxtw_mcI5"}]}]},"iAB_cGZtvYGo":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","firstCommand":"aC8iSHmKHojh","firstArg":"5gS4z5mOnDuY"}]}]},"inQbBSWydCWk":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"}]}]},"ioFx0itCFPcs":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"},{"imageID":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","firstCommand":"icTsn2s_EIax","firstArg":"47DEQpj8HBSa"}],"containers":[{"imageID":"sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","firstCommand":"bFMn8sKmxXTo","firstArg":"zO0oxtw_mcI5"}]}]},"jmuesrd3LOV1":{"count":5,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstCommand":"N9KxLV2avCo2","firstArg":"CSx56PgOVZ5A"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"aDHd4M_0XUOd","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"wCdwTcAdXQ_H","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstArg":"zO0oxtw_mcI5"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","firstCommand":"jXkiIgNfKeEy","firstArg":"zO0oxtw_mcI5"}]}]},"k2lPYOlQaXUX":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","firstCommand":"XqE_QmN1P920","firstArg":"r7zEsGNvlNrk"}]}]},"n8ih8iFf25K7":{"count":2,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","firstCommand":"CX8KiHZjJyVD"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","firstCommand":"N9KxLV2avCo2"}]}]},"nMMaB9HQd060":{"count":6,"ignoredCount":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","firstArg":"aZFPdeh8u0QY"}]},{"restartAlways":true,"initContainers":[{"imageID":"sha256:0bccc03fd9ffe278e15c8f4be1db030307e4cd5020b78d711fc62f104fd6a980","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:0bccc03fd9ffe278e15c8f4be1db030307e4cd5020b78d711fc62f104fd6a980","firstCommand":"icTsn2s_EIax","firstArg":"SCcKjYHEPDKM"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:96ae39329a45e017d3444b3794dc95126641ca54fe645bb8729b3d501bd47c64","firstArg":"5wzTZA9Ffwb3"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","firstArg":"aV86_fLS8Aye"},{"imageID":"sha256:9174864cd47431966d033d283bc7836e7ca579139ef85c36275db542fda80803","firstArg":"e1V8mDIYJ-Es"}]},{"restartAlways":true,"containers":[{"imageID":"sha256:97c7a635130c574a2c501091bb44f17cd92e05e29b5102e59578b5885d9bfec0","firstArg":"Sr6QxZ9vlnXv"}]}]},"nO8YkKLJMsaW":{"count":1,"shapes":[{"restartAlways":true,"initContainers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"icTsn2s_EIax"}],"containers":[{"imageID":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","firstCommand":"N9KxLV2avCo2","firstArg":"k19oMZ1PIn4C"},{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"47DEQpj8HBSa"}]}]},"nTf6g7hF1YMN":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","firstArg":"8DZ1gO9Xqn6d"}]}]},"oNeg9VIL3k3N":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","firstCommand":"oNeg9VIL3k3N","firstArg":"r7zEsGNvlNrk"}]}]},"pepxDbsB4SPa":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","firstCommand":"VvlllczXFX2z","firstArg":"r7zEsGNvlNrk"}]}]},"q1TpN3EUiKjG":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","firstCommand":"FATPL2W-sitV","firstArg":"r7zEsGNvlNrk"}]}]},"vDGHaQt8x6K_":{"count":1,"shapes":[{"restartAlways":true,"containers":[{"imageID":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","firstArg":"zO0oxtw_mcI5"}]}]}}}packageserver_current.log0000640000000000000000000011354515156522230034236 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/packageserver-5dccbdd8cc-pw7vm2026-03-18T13:09:32.977647349Z E0318 13:09:32.977608 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:32.977700291Z E0318 13:09:32.977683 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:32.977908777Z E0318 13:09:32.977879 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:32.977996949Z E0318 13:09:32.977980 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:33.852513472Z W0318 13:09:33.852400 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.48:50051: connect: connection refused" 2026-03-18T13:09:34.759449891Z W0318 13:09:34.759397 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.167.47:50051: connect: connection refused" 2026-03-18T13:09:36.058033451Z W0318 13:09:36.056260 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.70.202:50051: connect: connection refused" 2026-03-18T13:09:36.723221821Z W0318 13:09:36.723155 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.122.71:50051: connect: connection refused" 2026-03-18T13:09:51.642360766Z W0318 13:09:51.642290 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.70.202:50051: connect: connection refused" 2026-03-18T13:09:51.740465914Z W0318 13:09:51.740375 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.122.71:50051: connect: connection refused" 2026-03-18T13:09:53.370182477Z W0318 13:09:53.370114 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.48:50051: connect: connection refused" 2026-03-18T13:09:54.357598651Z W0318 13:09:54.345269 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.167.47:50051: connect: connection refused" 2026-03-18T13:09:55.154046627Z E0318 13:09:55.153990 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.154301484Z E0318 13:09:55.154263 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.154349326Z E0318 13:09:55.154311 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.154382477Z E0318 13:09:55.154086 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.154650524Z E0318 13:09:55.154522 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.252207766Z E0318 13:09:55.252111 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.259119450Z E0318 13:09:55.259036 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:02.986008704Z E0318 13:10:02.983828 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:02.986008704Z E0318 13:10:02.984149 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:02.986008704Z E0318 13:10:02.984308 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:02.986008704Z E0318 13:10:02.984461 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:02.986008704Z E0318 13:10:02.984665 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:16.844915772Z W0318 13:10:16.844835 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.167.47:50051: connect: connection refused" 2026-03-18T13:10:20.903644496Z W0318 13:10:20.903526 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.70.202:50051: connect: connection refused" 2026-03-18T13:10:21.707853254Z W0318 13:10:21.707764 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.122.71:50051: connect: connection refused" 2026-03-18T13:10:23.575305980Z W0318 13:10:23.575233 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.48:50051: connect: connection refused" 2026-03-18T13:10:25.137006681Z E0318 13:10:25.136786 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.137187256Z E0318 13:10:25.137132 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.137253388Z E0318 13:10:25.137214 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.137270149Z E0318 13:10:25.137135 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.154660161Z E0318 13:10:25.154573 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:32.992228934Z E0318 13:10:32.991240 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:32.992228934Z E0318 13:10:32.991482 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:32.992228934Z E0318 13:10:32.991683 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:32.992228934Z E0318 13:10:32.991768 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:32.992228934Z E0318 13:10:32.992026 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:34.532380492Z time="2026-03-18T13:10:34Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T13:10:34.532380492Z time="2026-03-18T13:10:34Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.167.47:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-18T13:10:34.532380492Z time="2026-03-18T13:10:34Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T13:10:34.532438044Z time="2026-03-18T13:10:34Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.70.202:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-18T13:10:55.172994764Z E0318 13:10:55.170204 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.172994764Z E0318 13:10:55.170410 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.172994764Z E0318 13:10:55.170512 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.172994764Z E0318 13:10:55.170630 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.172994764Z E0318 13:10:55.170717 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.249687667Z E0318 13:10:55.249618 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.263186409Z E0318 13:10:55.259288 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.456651031Z E0318 13:10:55.456581 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.461551980Z E0318 13:10:55.461510 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:03.002446006Z E0318 13:11:03.001514 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:03.002446006Z E0318 13:11:03.001729 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:03.002446006Z E0318 13:11:03.001759 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:03.002446006Z E0318 13:11:03.001854 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:03.002446006Z E0318 13:11:03.001887 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:10.478496514Z W0318 13:11:10.478107 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.122.71:50051: connect: connection refused" 2026-03-18T13:11:10.489095180Z W0318 13:11:10.488591 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.48:50051: connect: connection refused" 2026-03-18T13:11:10.501009404Z time="2026-03-18T13:11:10Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T13:11:10.501078786Z time="2026-03-18T13:11:10Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.122.71:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-18T13:11:10.501117557Z time="2026-03-18T13:11:10Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-18T13:11:10.504048101Z time="2026-03-18T13:11:10Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.255.48:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-18T13:11:12.657430553Z W0318 13:11:12.657369 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.167.47:50051: connect: connection refused" 2026-03-18T13:11:12.858799715Z W0318 13:11:12.858729 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.70.202:50051: connect: connection refused" 2026-03-18T13:11:13.075962143Z time="2026-03-18T13:11:13Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T13:11:13.075962143Z time="2026-03-18T13:11:13Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.167.47:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-18T13:11:13.246534237Z time="2026-03-18T13:11:13Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T13:11:13.246575198Z time="2026-03-18T13:11:13Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.70.202:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-18T13:11:15.664025702Z time="2026-03-18T13:11:15Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T13:11:15.664025702Z time="2026-03-18T13:11:15Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.122.71:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}" 2026-03-18T13:11:15.870493381Z time="2026-03-18T13:11:15Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace 2026-03-18T13:11:15.870493381Z time="2026-03-18T13:11:15Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.255.48:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}" 2026-03-18T13:11:17.645358440Z time="2026-03-18T13:11:17Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T13:11:17.645358440Z time="2026-03-18T13:11:17Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.167.47:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}" 2026-03-18T13:11:17.645358440Z time="2026-03-18T13:11:17Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T13:11:17.645358440Z time="2026-03-18T13:11:17Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 172.30.70.202:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}" 2026-03-18T13:11:25.143562397Z E0318 13:11:25.143001 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.143562397Z E0318 13:11:25.143110 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.143562397Z E0318 13:11:25.143222 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.143562397Z E0318 13:11:25.143342 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.143562397Z E0318 13:11:25.143502 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:26.977041057Z W0318 13:11:26.976993 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.122.71:50051: connect: connection refused" 2026-03-18T13:11:28.303684208Z W0318 13:11:28.303623 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.122.71:50051: connect: connection refused" 2026-03-18T13:11:29.028144927Z W0318 13:11:29.027968 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.70.202:50051: connect: connection refused" 2026-03-18T13:11:30.802210252Z W0318 13:11:30.802155 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.70.202:50051: connect: connection refused" 2026-03-18T13:11:31.222364969Z W0318 13:11:31.222279 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.122.71:50051: connect: connection refused" 2026-03-18T13:11:31.490120187Z W0318 13:11:31.490037 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.255.48:50051: i/o timeout" 2026-03-18T13:11:33.005835214Z E0318 13:11:33.005054 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:33.005835214Z E0318 13:11:33.005071 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:33.005835214Z E0318 13:11:33.005235 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:33.005835214Z E0318 13:11:33.005292 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:33.005835214Z E0318 13:11:33.005297 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:33.594196866Z W0318 13:11:33.594147 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.70.202:50051: connect: connection refused" 2026-03-18T13:11:33.659857021Z W0318 13:11:33.659785 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 172.30.167.47:50051: i/o timeout" 2026-03-18T13:11:35.581990340Z time="2026-03-18T13:11:35Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T13:11:35.893464239Z time="2026-03-18T13:11:35Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T13:11:37.620484916Z time="2026-03-18T13:11:37Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace 2026-03-18T13:11:38.107639777Z time="2026-03-18T13:11:38Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace 2026-03-18T13:11:39.918114601Z time="2026-03-18T13:11:39Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace 2026-03-18T13:11:41.159514242Z time="2026-03-18T13:11:41Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace package-server-manager_current.log0000640000000000000000000003140415156522230037041 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-kbpvr2026-03-18T13:09:04.233221442Z 2026-03-18T13:09:04Z INFO setup starting manager 2026-03-18T13:09:04.233612683Z 2026-03-18T13:09:04Z INFO controller-runtime.metrics Starting metrics server 2026-03-18T13:09:04.235163427Z 2026-03-18T13:09:04Z INFO starting server {"name": "pprof", "addr": "[::]:6060"} 2026-03-18T13:09:04.235616470Z 2026-03-18T13:09:04Z INFO starting server {"name": "health probe", "addr": "[::]:8080"} 2026-03-18T13:09:04.235668631Z I0318 13:09:04.235390 1 leaderelection.go:254] attempting to acquire leader lease openshift-operator-lifecycle-manager/packageserver-controller-lock... 2026-03-18T13:09:04.240545908Z 2026-03-18T13:09:04Z INFO controller-runtime.metrics Serving metrics server {"bindAddress": ":9090", "secure": false} 2026-03-18T13:09:04.264372015Z I0318 13:09:04.264304 1 leaderelection.go:268] successfully acquired lease openshift-operator-lifecycle-manager/packageserver-controller-lock 2026-03-18T13:09:04.275797215Z 2026-03-18T13:09:04Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1alpha1.ClusterServiceVersion"} 2026-03-18T13:09:04.275797215Z 2026-03-18T13:09:04Z INFO Starting EventSource {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "source": "kind source: *v1.Infrastructure"} 2026-03-18T13:09:04.275797215Z 2026-03-18T13:09:04Z INFO Starting Controller {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion"} 2026-03-18T13:09:04.275972810Z 2026-03-18T13:09:04Z DEBUG events package-server-manager-7b95f86987-kbpvr_ff25a09a-7f57-4aff-b0d7-b6ca2f6dda03 became leader {"type": "Normal", "object": {"kind":"Lease","namespace":"openshift-operator-lifecycle-manager","name":"packageserver-controller-lock","uid":"9ca9dd24-eb22-4247-87c4-df2af39e34da","apiVersion":"coordination.k8s.io/v1","resourceVersion":"7458"}, "reason": "LeaderElection"} 2026-03-18T13:09:04.392020660Z 2026-03-18T13:09:04Z INFO controllers.packageserver requeueing the packageserver deployment after encountering infrastructure event {"infrastructure": "cluster"} 2026-03-18T13:09:04.392210305Z 2026-03-18T13:09:04Z INFO Starting workers {"controller": "clusterserviceversion", "controllerGroup": "operators.coreos.com", "controllerKind": "ClusterServiceVersion", "worker count": 1} 2026-03-18T13:09:04.392372600Z 2026-03-18T13:09:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:09:04.392406921Z 2026-03-18T13:09:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.710487649Z 2026-03-18T13:09:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.710722746Z 2026-03-18T13:09:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:09:04.741429396Z 2026-03-18T13:09:04Z INFO controllers.packageserver attempting to create the packageserver csv 2026-03-18T13:09:04.751307542Z 2026-03-18T13:09:04Z INFO controllers.packageserver updating csv spec 2026-03-18T13:09:04.788146824Z 2026-03-18T13:09:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "created"} 2026-03-18T13:09:04.788146824Z 2026-03-18T13:09:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.788146824Z 2026-03-18T13:09:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:09:04.788146824Z 2026-03-18T13:09:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.788146824Z 2026-03-18T13:09:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.788146824Z 2026-03-18T13:09:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:09:04.868362451Z 2026-03-18T13:09:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:09:04.868362451Z 2026-03-18T13:09:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.868471244Z 2026-03-18T13:09:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:09:04.868471244Z 2026-03-18T13:09:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.868540246Z 2026-03-18T13:09:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.868573517Z 2026-03-18T13:09:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:09:04.952043025Z 2026-03-18T13:09:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:09:04.952043025Z 2026-03-18T13:09:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.952063455Z 2026-03-18T13:09:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:09:04.952070845Z 2026-03-18T13:09:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.964229156Z 2026-03-18T13:09:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.964229156Z 2026-03-18T13:09:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:09:04.982773605Z 2026-03-18T13:09:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:09:04.982773605Z 2026-03-18T13:09:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.982819526Z 2026-03-18T13:09:04Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:09:04.982819526Z 2026-03-18T13:09:04Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.982901939Z 2026-03-18T13:09:04Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:04.982952720Z 2026-03-18T13:09:04Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:09:04.997400405Z 2026-03-18T13:09:04Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:09:04.997447606Z 2026-03-18T13:09:04Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:05.806087363Z 2026-03-18T13:09:05Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:09:05.807141112Z 2026-03-18T13:09:05Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:05.807249175Z 2026-03-18T13:09:05Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:05.807312477Z 2026-03-18T13:09:05Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:09:05.832009809Z 2026-03-18T13:09:05Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:09:05.832009809Z 2026-03-18T13:09:05Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:06.030200779Z 2026-03-18T13:09:06Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:09:06.030290262Z 2026-03-18T13:09:06Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:06.030405035Z 2026-03-18T13:09:06Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:06.030471517Z 2026-03-18T13:09:06Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:09:06.055993722Z 2026-03-18T13:09:06Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:09:06.055993722Z 2026-03-18T13:09:06Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:06.400375497Z 2026-03-18T13:09:06Z INFO controllers.packageserver handling current request {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "request": "openshift-operator-lifecycle-manager/packageserver"} 2026-03-18T13:09:06.400375497Z 2026-03-18T13:09:06Z INFO controllers.packageserver checking to see if required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:06.400426658Z 2026-03-18T13:09:06Z INFO controllers.packageserver confimed required RBAC exists {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} 2026-03-18T13:09:06.400436189Z 2026-03-18T13:09:06Z INFO controllers.packageserver currently topology mode {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "highly available": false} 2026-03-18T13:09:06.418097813Z 2026-03-18T13:09:06Z INFO controllers.packageserver reconciliation result {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}, "res": "unchanged"} 2026-03-18T13:09:06.418097813Z 2026-03-18T13:09:06Z INFO controllers.packageserver finished request reconciliation {"csv": {"name":"packageserver","namespace":"openshift-operator-lifecycle-manager"}} kube-rbac-proxy_current.log0000640000000000000000000000160415156522230035543 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/package-server-manager-7b95f86987-kbpvr2026-03-18T13:08:47.459992562Z W0318 13:08:47.457784 1 deprecated.go:66] 2026-03-18T13:08:47.459992562Z ==== Removed Flag Warning ====================== 2026-03-18T13:08:47.459992562Z 2026-03-18T13:08:47.459992562Z logtostderr is removed in the k8s upstream and has no effect any more. 2026-03-18T13:08:47.459992562Z 2026-03-18T13:08:47.459992562Z =============================================== 2026-03-18T13:08:47.459992562Z 2026-03-18T13:08:47.459992562Z I0318 13:08:47.458407 1 kube-rbac-proxy.go:233] Valid token audiences: 2026-03-18T13:08:47.465032543Z I0318 13:08:47.463087 1 kube-rbac-proxy.go:347] Reading certificate files 2026-03-18T13:08:47.465032543Z I0318 13:08:47.464478 1 kube-rbac-proxy.go:395] Starting TCP socket on 0.0.0.0:8443 2026-03-18T13:08:47.465727623Z I0318 13:08:47.465397 1 kube-rbac-proxy.go:402] Listening securely on 0.0.0.0:8443 olm-operator_current.log0000640000000000000000000005177415156522230032756 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/olm-operator-5c9796789-8r4hr2026-03-18T13:11:42.470197002Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=OYAFK namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.475768543Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=B6Rrt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.481972912Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=bgUke namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.488136530Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=O+q55 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.493812634Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=anbD8 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.500229889Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=LRmKD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.505819040Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=RywEa namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.511755522Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=1esOO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.517739244Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=vmoVQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.524343885Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=77upA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.537457183Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=TUW52 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.638116539Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=2TLd+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.737999812Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=rlHbj namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.939366784Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=KSRkR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:42.946462129Z time="2026-03-18T13:11:42Z" level=info msg="install strategy successful" csv=packageserver id=pCoY1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:43.239360072Z time="2026-03-18T13:11:43Z" level=info msg="install strategy successful" csv=packageserver id=SXucy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:43.264833147Z time="2026-03-18T13:11:43Z" level=info msg="install strategy successful" csv=packageserver id=6gP2+ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:43.536150139Z time="2026-03-18T13:11:43Z" level=info msg="install strategy successful" csv=packageserver id=6Sf4z namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:43.548903527Z time="2026-03-18T13:11:43Z" level=info msg="install strategy successful" csv=packageserver id=k+dWB namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:43.555496257Z time="2026-03-18T13:11:43Z" level=info msg="install strategy successful" csv=packageserver id=/0Mab namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:43.561211762Z time="2026-03-18T13:11:43Z" level=info msg="install strategy successful" csv=packageserver id=8nfNc namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:43.708030210Z time="2026-03-18T13:11:43Z" level=info msg="install strategy successful" csv=packageserver id=70Qtr namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:43.938397469Z time="2026-03-18T13:11:43Z" level=info msg="install strategy successful" csv=packageserver id=sBUsO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:44.039024793Z time="2026-03-18T13:11:44Z" level=info msg="install strategy successful" csv=packageserver id=lfhKF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:44.162638151Z time="2026-03-18T13:11:44Z" level=info msg="install strategy successful" csv=packageserver id=PKe43 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:44.168663885Z time="2026-03-18T13:11:44Z" level=info msg="install strategy successful" csv=packageserver id=FSVRs namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:44.174073101Z time="2026-03-18T13:11:44Z" level=info msg="install strategy successful" csv=packageserver id=ikp8/ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:44.237899044Z time="2026-03-18T13:11:44Z" level=info msg="install strategy successful" csv=packageserver id=CWQuR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:44.550045303Z time="2026-03-18T13:11:44Z" level=info msg="install strategy successful" csv=packageserver id=he6j2 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:44.557117687Z time="2026-03-18T13:11:44Z" level=info msg="install strategy successful" csv=packageserver id=aFDSm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:44.671070236Z time="2026-03-18T13:11:44Z" level=info msg="install strategy successful" csv=packageserver id=8b2II namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:44.884548798Z time="2026-03-18T13:11:44Z" level=info msg="install strategy successful" csv=packageserver id=bvOIn namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.001037670Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=td8jv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.110547941Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=6Nbrg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.247493614Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=YkTMW namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.254536727Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=bsp5S namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.309919686Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=HpozR namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.410723345Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=I4OSd namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.512755130Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=5Adym namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.611263733Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=6P+xG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.715775330Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=e1Pu4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.812526472Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=uaLMO namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:45.919121749Z time="2026-03-18T13:11:45Z" level=info msg="install strategy successful" csv=packageserver id=+hN7N namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.013598386Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=0uorp namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.023572044Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=TXEeh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.041985795Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=tkolg namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.141182888Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=dUWgX namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.239633320Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=xVwwx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.340113170Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=GHm3W namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.440157298Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=kotwG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.544342935Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=fh3Ha namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.647458880Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=hQV5V namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.755349664Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=kR6jt namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.837859206Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=2vB0q namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:46.939299594Z time="2026-03-18T13:11:46Z" level=info msg="install strategy successful" csv=packageserver id=EZNRI namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:47.039873766Z time="2026-03-18T13:11:47Z" level=info msg="install strategy successful" csv=packageserver id=4QpUo namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:47.138057780Z time="2026-03-18T13:11:47Z" level=info msg="install strategy successful" csv=packageserver id=H3v1m namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:47.240862448Z time="2026-03-18T13:11:47Z" level=info msg="install strategy successful" csv=packageserver id=5vKld namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:47.338800404Z time="2026-03-18T13:11:47Z" level=info msg="install strategy successful" csv=packageserver id=fBOZl namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:47.439708997Z time="2026-03-18T13:11:47Z" level=info msg="install strategy successful" csv=packageserver id=nPLIz namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:47.539146407Z time="2026-03-18T13:11:47Z" level=info msg="install strategy successful" csv=packageserver id=dKaAG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:47.642219492Z time="2026-03-18T13:11:47Z" level=info msg="install strategy successful" csv=packageserver id=OfDme namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:47.742329651Z time="2026-03-18T13:11:47Z" level=info msg="install strategy successful" csv=packageserver id=DYr5P namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:47.842720079Z time="2026-03-18T13:11:47Z" level=info msg="install strategy successful" csv=packageserver id=TXXG1 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:47.942747906Z time="2026-03-18T13:11:47Z" level=info msg="install strategy successful" csv=packageserver id=Hy0dU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:48.038314374Z time="2026-03-18T13:11:48Z" level=info msg="install strategy successful" csv=packageserver id=RpZGF namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:48.138431594Z time="2026-03-18T13:11:48Z" level=info msg="install strategy successful" csv=packageserver id=iofy6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:48.238076210Z time="2026-03-18T13:11:48Z" level=info msg="install strategy successful" csv=packageserver id=CA9H6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:48.337869800Z time="2026-03-18T13:11:48Z" level=info msg="install strategy successful" csv=packageserver id=Xfn27 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:48.440826872Z time="2026-03-18T13:11:48Z" level=info msg="install strategy successful" csv=packageserver id=pGUIb namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:48.542611980Z time="2026-03-18T13:11:48Z" level=info msg="install strategy successful" csv=packageserver id=UDsGm namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:48.641892965Z time="2026-03-18T13:11:48Z" level=info msg="install strategy successful" csv=packageserver id=qomcf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:48.738443022Z time="2026-03-18T13:11:48Z" level=info msg="install strategy successful" csv=packageserver id=vqqmA namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:48.838504040Z time="2026-03-18T13:11:48Z" level=info msg="install strategy successful" csv=packageserver id=JIcl6 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:48.939111004Z time="2026-03-18T13:11:48Z" level=info msg="install strategy successful" csv=packageserver id=2/ByG namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:49.067158830Z time="2026-03-18T13:11:49Z" level=info msg="install strategy successful" csv=packageserver id=cwNG4 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:49.165127118Z time="2026-03-18T13:11:49Z" level=info msg="install strategy successful" csv=packageserver id=qJ0Kf namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:49.239043021Z time="2026-03-18T13:11:49Z" level=info msg="install strategy successful" csv=packageserver id=cgx5K namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:49.341845688Z time="2026-03-18T13:11:49Z" level=info msg="install strategy successful" csv=packageserver id=aN9Gu namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:49.441184385Z time="2026-03-18T13:11:49Z" level=info msg="install strategy successful" csv=packageserver id=fE+Wx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:49.547256177Z time="2026-03-18T13:11:49Z" level=info msg="install strategy successful" csv=packageserver id=4vdPi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:49.642845606Z time="2026-03-18T13:11:49Z" level=info msg="install strategy successful" csv=packageserver id=54WLv namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:49.743045248Z time="2026-03-18T13:11:49Z" level=info msg="install strategy successful" csv=packageserver id=2QaIq namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:49.843592070Z time="2026-03-18T13:11:49Z" level=info msg="install strategy successful" csv=packageserver id=Gd8sh namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:49.938038556Z time="2026-03-18T13:11:49Z" level=info msg="install strategy successful" csv=packageserver id=AH+3H namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:50.038071473Z time="2026-03-18T13:11:50Z" level=info msg="install strategy successful" csv=packageserver id=guLUx namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:50.139993255Z time="2026-03-18T13:11:50Z" level=info msg="install strategy successful" csv=packageserver id=IKVnk namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:50.241263877Z time="2026-03-18T13:11:50Z" level=info msg="install strategy successful" csv=packageserver id=u9G4S namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:50.341026656Z time="2026-03-18T13:11:50Z" level=info msg="install strategy successful" csv=packageserver id=D0/eD namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:50.441827986Z time="2026-03-18T13:11:50Z" level=info msg="install strategy successful" csv=packageserver id=pKBqU namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:50.538111445Z time="2026-03-18T13:11:50Z" level=info msg="install strategy successful" csv=packageserver id=v1/gH namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:50.638843182Z time="2026-03-18T13:11:50Z" level=info msg="install strategy successful" csv=packageserver id=b8eO7 namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:50.738181260Z time="2026-03-18T13:11:50Z" level=info msg="install strategy successful" csv=packageserver id=jBRNQ namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:50.838203866Z time="2026-03-18T13:11:50Z" level=info msg="install strategy successful" csv=packageserver id=0suKi namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:50.937903064Z time="2026-03-18T13:11:50Z" level=info msg="install strategy successful" csv=packageserver id=/ZRZT namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:51.038617601Z time="2026-03-18T13:11:51Z" level=info msg="install strategy successful" csv=packageserver id=JEc3J namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:51.138915446Z time="2026-03-18T13:11:51Z" level=info msg="install strategy successful" csv=packageserver id=yby/w namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:51.238641944Z time="2026-03-18T13:11:51Z" level=info msg="install strategy successful" csv=packageserver id=+dATy namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:51.340150494Z time="2026-03-18T13:11:51Z" level=info msg="install strategy successful" csv=packageserver id=bx15Y namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment 2026-03-18T13:11:51.441330295Z time="2026-03-18T13:11:51Z" level=info msg="install strategy successful" csv=packageserver id=oT19p namespace=openshift-operator-lifecycle-manager phase=Installing strategy=deployment catalog-operator_current.log0000640000000000000000000005715415156522230034616 0ustar0000000000000000config/pod/openshift-operator-lifecycle-manager/logs/catalog-operator-68f85b4d6c-p9k562026-03-18T13:11:35.582483904Z time="2026-03-18T13:11:35Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:35.582483904Z time="2026-03-18T13:11:35Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:35.876991253Z time="2026-03-18T13:11:35Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bQ6Ox 2026-03-18T13:11:35.876991253Z time="2026-03-18T13:11:35Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-d7pj2 current-pod.namespace=openshift-marketplace id=bQ6Ox 2026-03-18T13:11:35.876991253Z time="2026-03-18T13:11:35Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-d7pj2 current-pod.namespace=openshift-marketplace id=bQ6Ox 2026-03-18T13:11:35.876991253Z time="2026-03-18T13:11:35Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bQ6Ox 2026-03-18T13:11:35.876991253Z time="2026-03-18T13:11:35Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=bQ6Ox 2026-03-18T13:11:35.890078261Z time="2026-03-18T13:11:35Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:35.890078261Z time="2026-03-18T13:11:35Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:36.076775900Z time="2026-03-18T13:11:36Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:36.076866783Z time="2026-03-18T13:11:36Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:36.076866783Z time="2026-03-18T13:11:36Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:36.076880713Z time="2026-03-18T13:11:36Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=9bY5S 2026-03-18T13:11:36.076889863Z time="2026-03-18T13:11:36Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:36.076889863Z time="2026-03-18T13:11:36Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:36.798518112Z time="2026-03-18T13:11:36Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:36.798518112Z time="2026-03-18T13:11:36Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-d7pj2 current-pod.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:36.798518112Z time="2026-03-18T13:11:36Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-d7pj2 current-pod.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:36.798518112Z time="2026-03-18T13:11:36Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=ieHY2 2026-03-18T13:11:36.798518112Z time="2026-03-18T13:11:36Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:36.798518112Z time="2026-03-18T13:11:36Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:37.329571149Z time="2026-03-18T13:11:37Z" level=info msg="state.Key.Namespace=openshift-marketplace state.Key.Name=redhat-operators state.State=READY" 2026-03-18T13:11:37.329571149Z time="2026-03-18T13:11:37Z" level=info msg="resolving sources" id=i51V4 namespace=openshift-marketplace 2026-03-18T13:11:37.329571149Z time="2026-03-18T13:11:37Z" level=info msg="checking if subscriptions need update" id=i51V4 namespace=openshift-marketplace 2026-03-18T13:11:37.348472835Z time="2026-03-18T13:11:37Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:37.348583298Z time="2026-03-18T13:11:37Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:37.348583298Z time="2026-03-18T13:11:37Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:37.348706322Z time="2026-03-18T13:11:37Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:37.348706322Z time="2026-03-18T13:11:37Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9bY5S 2026-03-18T13:11:37.362688535Z time="2026-03-18T13:11:37Z" level=info msg="No subscriptions were found in namespace openshift-marketplace" id=i51V4 namespace=openshift-marketplace 2026-03-18T13:11:37.612647060Z time="2026-03-18T13:11:37Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:37.612647060Z time="2026-03-18T13:11:37Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:38.044817153Z time="2026-03-18T13:11:38Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:38.044817153Z time="2026-03-18T13:11:38Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-d7pj2 current-pod.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:38.044817153Z time="2026-03-18T13:11:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-d7pj2 current-pod.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:38.044817153Z time="2026-03-18T13:11:38Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:38.044817153Z time="2026-03-18T13:11:38Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ieHY2 2026-03-18T13:11:38.109032947Z time="2026-03-18T13:11:38Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:38.109032947Z time="2026-03-18T13:11:38Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-459lq current-pod.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:38.109032947Z time="2026-03-18T13:11:38Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-459lq current-pod.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:38.109032947Z time="2026-03-18T13:11:38Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=SirAu 2026-03-18T13:11:38.109032947Z time="2026-03-18T13:11:38Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:38.109032947Z time="2026-03-18T13:11:38Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:38.110105718Z time="2026-03-18T13:11:38Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:38.110105718Z time="2026-03-18T13:11:38Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:39.111790069Z time="2026-03-18T13:11:39Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:39.111790069Z time="2026-03-18T13:11:39Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:39.111790069Z time="2026-03-18T13:11:39Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:39.111790069Z time="2026-03-18T13:11:39Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=9G3sm 2026-03-18T13:11:39.111790069Z time="2026-03-18T13:11:39Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:39.111790069Z time="2026-03-18T13:11:39Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:39.112361306Z time="2026-03-18T13:11:39Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:39.112361306Z time="2026-03-18T13:11:39Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-459lq current-pod.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:39.112361306Z time="2026-03-18T13:11:39Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-459lq current-pod.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:39.112361306Z time="2026-03-18T13:11:39Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:39.112361306Z time="2026-03-18T13:11:39Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=SirAu 2026-03-18T13:11:39.919003497Z time="2026-03-18T13:11:39Z" level=info msg="syncing catalog source" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:39.919003497Z time="2026-03-18T13:11:39Z" level=info msg="synchronizing registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:40.834913693Z time="2026-03-18T13:11:40Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:40.834913693Z time="2026-03-18T13:11:40Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-d7pj2 current-pod.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:40.834913693Z time="2026-03-18T13:11:40Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-d7pj2 current-pod.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:40.834913693Z time="2026-03-18T13:11:40Z" level=info msg="checked registry server health" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace health=true id=ryF9x 2026-03-18T13:11:40.834913693Z time="2026-03-18T13:11:40Z" level=info msg="registry state good" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:40.834913693Z time="2026-03-18T13:11:40Z" level=info msg="ensuring registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:40.990539385Z time="2026-03-18T13:11:40Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:40.990539385Z time="2026-03-18T13:11:40Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:40.990539385Z time="2026-03-18T13:11:40Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:40.990591836Z time="2026-03-18T13:11:40Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:40.990591836Z time="2026-03-18T13:11:40Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=9G3sm 2026-03-18T13:11:41.157570096Z time="2026-03-18T13:11:41Z" level=info msg="syncing catalog source" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:41.157570096Z time="2026-03-18T13:11:41Z" level=info msg="synchronizing registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:41.162277402Z time="2026-03-18T13:11:41Z" level=info msg="searching for current pods" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:41.162277402Z time="2026-03-18T13:11:41Z" level=info msg="evaluating current pod" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-d7pj2 current-pod.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:41.162277402Z time="2026-03-18T13:11:41Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=certified-operators-d7pj2 current-pod.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:41.162277402Z time="2026-03-18T13:11:41Z" level=info msg="ensured registry server" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:41.162277402Z time="2026-03-18T13:11:41Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=certified-operators catalogsource.namespace=openshift-marketplace id=ryF9x 2026-03-18T13:11:41.162277402Z time="2026-03-18T13:11:41Z" level=info msg="syncing catalog source" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:41.162277402Z time="2026-03-18T13:11:41Z" level=info msg="synchronizing registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:41.191773963Z time="2026-03-18T13:11:41Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:41.191773963Z time="2026-03-18T13:11:41Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-459lq current-pod.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:41.191773963Z time="2026-03-18T13:11:41Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-459lq current-pod.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:41.191773963Z time="2026-03-18T13:11:41Z" level=info msg="checked registry server health" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace health=true id=rQGsR 2026-03-18T13:11:41.191773963Z time="2026-03-18T13:11:41Z" level=info msg="registry state good" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:41.191773963Z time="2026-03-18T13:11:41Z" level=info msg="ensuring registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:41.718147396Z time="2026-03-18T13:11:41Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:41.718147396Z time="2026-03-18T13:11:41Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:41.718147396Z time="2026-03-18T13:11:41Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:41.718147396Z time="2026-03-18T13:11:41Z" level=info msg="checked registry server health" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace health=true id=+Kc+6 2026-03-18T13:11:41.718147396Z time="2026-03-18T13:11:41Z" level=info msg="registry state good" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:41.718147396Z time="2026-03-18T13:11:41Z" level=info msg="ensuring registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:42.278698735Z time="2026-03-18T13:11:42Z" level=info msg="searching for current pods" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:42.278799708Z time="2026-03-18T13:11:42Z" level=info msg="evaluating current pod" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-459lq current-pod.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:42.278799708Z time="2026-03-18T13:11:42Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=redhat-operators-459lq current-pod.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:42.278899731Z time="2026-03-18T13:11:42Z" level=info msg="ensured registry server" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:42.278899731Z time="2026-03-18T13:11:42Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=redhat-operators catalogsource.namespace=openshift-marketplace id=rQGsR 2026-03-18T13:11:42.674837389Z time="2026-03-18T13:11:42Z" level=info msg="searching for current pods" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:42.675083036Z time="2026-03-18T13:11:42Z" level=info msg="evaluating current pod" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:42.675097946Z time="2026-03-18T13:11:42Z" level=info msg="of 1 pods matching label selector, 1 have the correct images and matching hash" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace correctHash=true correctImages=true current-pod.name=community-operators-nhwvw current-pod.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:42.675304612Z time="2026-03-18T13:11:42Z" level=info msg="ensured registry server" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+Kc+6 2026-03-18T13:11:42.675336833Z time="2026-03-18T13:11:42Z" level=info msg="requeuing registry server sync based on polling interval 4h0m0s" catalogsource.name=community-operators catalogsource.namespace=openshift-marketplace id=+Kc+6 config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-hmbpl/etcd-operator_current.log0000640000000000000000000001055315156522230031346 0ustar00000000000000002026-03-18T13:10:28.698165649Z I0318 13:10:28.697962 1 profiler.go:21] Starting profiling endpoint at http://127.0.0.1:6060/debug/pprof/ 2026-03-18T13:10:28.698352294Z I0318 13:10:28.698204 1 observer_polling.go:159] Starting file observer 2026-03-18T13:10:28.698711234Z I0318 13:10:28.698669 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:10:28.698722395Z I0318 13:10:28.698702 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:10:28.699175457Z I0318 13:10:28.699117 1 observer_polling.go:159] Starting file observer 2026-03-18T13:10:35.323740135Z I0318 13:10:35.323119 1 builder.go:304] openshift-cluster-etcd-operator version 4.18.0-202602261953.p2.gb7e21f5.assembly.stream.el9-b7e21f5-b7e21f52fab30ac18bb890c61f724332f332b934 2026-03-18T13:10:35.958674927Z I0318 13:10:35.958606 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:10:35.958674927Z W0318 13:10:35.958636 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:10:35.958674927Z W0318 13:10:35.958642 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:10:35.958674927Z W0318 13:10:35.958647 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:10:35.958674927Z W0318 13:10:35.958650 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:10:35.958674927Z W0318 13:10:35.958653 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:10:35.958674927Z W0318 13:10:35.958656 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:10:35.967371143Z I0318 13:10:35.967294 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:10:35.967711963Z I0318 13:10:35.967649 1 leaderelection.go:254] attempting to acquire leader lease openshift-etcd-operator/openshift-cluster-etcd-operator-lock... 2026-03-18T13:10:35.969697139Z I0318 13:10:35.969641 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:10:35.969720530Z I0318 13:10:35.969705 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:10:35.969805962Z I0318 13:10:35.969761 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:10:35.969805962Z I0318 13:10:35.969790 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:10:35.969816372Z I0318 13:10:35.969808 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:10:35.969823623Z I0318 13:10:35.969815 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:35.971932622Z I0318 13:10:35.971404 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:10:35.974666670Z I0318 13:10:35.973167 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:10:35.974666670Z I0318 13:10:35.973233 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:10:36.073324165Z I0318 13:10:36.072296 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:36.073324165Z I0318 13:10:36.072365 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:10:36.073324165Z I0318 13:10:36.072454 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file config/pod/openshift-etcd-operator/logs/etcd-operator-8544cbcf9c-hmbpl/etcd-operator_previous.log0000640000000000000000000004242315156522230031541 0ustar00000000000000002026-03-18T13:09:22.543886234Z I0318 13:09:22.543880 1 envvarcontroller.go:252] Shutting down EnvVarController 2026-03-18T13:09:22.543908185Z I0318 13:09:22.543892 1 base_controller.go:181] Shutting down EtcdEndpointsController ... 2026-03-18T13:09:22.544034918Z I0318 13:09:22.544014 1 core.go:352] ConfigMap "openshift-etcd/etcd-endpoints" changes: {"data":{"91eb892c5ee87610":"192.168.32.10","MTkyLjE2OC4zMi4xMA":null},"metadata":{"creationTimestamp":null,"managedFields":null,"resourceVersion":null,"uid":null}} 2026-03-18T13:09:22.544238994Z E0318 13:09:22.544208 1 base_controller.go:279] "Unhandled Error" err="ScriptController reconciliation failed: \"configmap/etcd-pod\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-scripts\": context canceled" 2026-03-18T13:09:22.544497221Z I0318 13:09:22.544473 1 base_controller.go:123] Shutting down worker of etcd-StaticPodState controller ... 2026-03-18T13:09:22.544507911Z I0318 13:09:22.544495 1 base_controller.go:113] All etcd-StaticPodState workers have been terminated 2026-03-18T13:09:22.544507911Z I0318 13:09:22.544502 1 controller_manager.go:54] etcd-StaticPodState controller terminated 2026-03-18T13:09:22.544597544Z E0318 13:09:22.544576 1 base_controller.go:279] "Unhandled Error" err="EtcdEndpointsController reconciliation failed: applying configmap update failed :Put \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-endpoints\": context canceled" 2026-03-18T13:09:22.544597544Z I0318 13:09:22.544592 1 base_controller.go:123] Shutting down worker of etcd-Node controller ... 2026-03-18T13:09:22.544607414Z I0318 13:09:22.544599 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-18T13:09:22.544614784Z I0318 13:09:22.544604 1 base_controller.go:113] All etcd-Node workers have been terminated 2026-03-18T13:09:22.544614784Z I0318 13:09:22.544609 1 base_controller.go:113] All Installer workers have been terminated 2026-03-18T13:09:22.544614784Z I0318 13:09:22.544611 1 controller_manager.go:54] etcd-Node controller terminated 2026-03-18T13:09:22.544622885Z I0318 13:09:22.544615 1 controller_manager.go:54] Installer controller terminated 2026-03-18T13:09:22.544630135Z I0318 13:09:22.544622 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-18T13:09:22.544630135Z I0318 13:09:22.544626 1 base_controller.go:181] Shutting down PruneController ... 2026-03-18T13:09:22.544638625Z I0318 13:09:22.544630 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-18T13:09:22.544638625Z I0318 13:09:22.544635 1 controller_manager.go:54] GuardController controller terminated 2026-03-18T13:09:22.544646075Z I0318 13:09:22.544639 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-18T13:09:22.544653056Z I0318 13:09:22.544647 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-18T13:09:22.544682316Z I0318 13:09:22.544658 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-18T13:09:22.544682316Z I0318 13:09:22.544668 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-18T13:09:22.544682316Z I0318 13:09:22.544679 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-18T13:09:22.544705607Z I0318 13:09:22.544688 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:09:22.544713307Z I0318 13:09:22.544705 1 base_controller.go:123] Shutting down worker of ClusterMemberController controller ... 2026-03-18T13:09:22.544720447Z I0318 13:09:22.544713 1 base_controller.go:113] All ClusterMemberController workers have been terminated 2026-03-18T13:09:22.546673902Z E0318 13:09:22.544976 1 base_controller.go:279] "Unhandled Error" err="EtcdCertSignerController reconciliation failed: could not get current etcd-all-bundles configmap context canceled" 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545000 1 base_controller.go:123] Shutting down worker of etcd-operator-UnsupportedConfigOverrides controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545011 1 base_controller.go:113] All etcd-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545013 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545017 1 controller_manager.go:54] etcd-operator-UnsupportedConfigOverrides controller terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545022 1 base_controller.go:181] Shutting down DefragController ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545039 1 base_controller.go:181] Shutting down StatusSyncer_etcd ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545047 1 base_controller.go:159] All StatusSyncer_etcd post start hooks have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545041 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545070 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545076 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545072 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"83bcabfb-e93a-4a83-98ad-7f565a8025c7", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ScriptControllerErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545088 1 base_controller.go:181] Shutting down etcd-UnsupportedConfigOverrides ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545113 1 base_controller.go:123] Shutting down worker of DefragController controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545120 1 base_controller.go:113] All DefragController workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545138 1 base_controller.go:123] Shutting down worker of StatusSyncer_etcd controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545145 1 base_controller.go:113] All StatusSyncer_etcd workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545158 1 base_controller.go:123] Shutting down worker of etcd-UnsupportedConfigOverrides controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545166 1 base_controller.go:113] All etcd-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545220 1 base_controller.go:123] Shutting down worker of etcd controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545554 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1047004385/tls.crt::/tmp/serving-cert-1047004385/tls.key" 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545702 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545733 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-18T13:09:22.546673902Z E0318 13:09:22.545789 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545804 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545816 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545827 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545804 1 base_controller.go:123] Shutting down worker of EtcdEndpointsController controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545847 1 base_controller.go:113] All EtcdEndpointsController workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545857 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545862 1 builder.go:335] server exited 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545923 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545930 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.545959 1 controller_manager.go:54] PruneController controller terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546019 1 base_controller.go:123] Shutting down worker of ClusterMemberRemovalController controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546025 1 base_controller.go:113] All ClusterMemberRemovalController workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546034 1 base_controller.go:123] Shutting down worker of MachineDeletionHooksController controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546041 1 base_controller.go:113] All MachineDeletionHooksController workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546046 1 base_controller.go:123] Shutting down worker of BootstrapTeardownController controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546055 1 base_controller.go:113] All BootstrapTeardownController workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546057 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546064 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546067 1 controller_manager.go:54] RevisionController controller terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546063 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"83bcabfb-e93a-4a83-98ad-7f565a8025c7", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ConfigMapUpdateFailed' Failed to update ConfigMap/etcd-endpoints -n openshift-etcd: Put "https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/configmaps/etcd-endpoints": context canceled 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546072 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-etcd-operator", Name:"etcd-operator", UID:"83bcabfb-e93a-4a83-98ad-7f565a8025c7", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'EtcdEndpointsErrorUpdatingStatus' client rate limiter Wait returned an error: context canceled 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546141 1 base_controller.go:123] Shutting down worker of ScriptController controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546142 1 base_controller.go:123] Shutting down worker of EtcdCertSignerController controller ... 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546150 1 base_controller.go:113] All ScriptController workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546156 1 base_controller.go:113] All EtcdCertSignerController workers have been terminated 2026-03-18T13:09:22.546673902Z I0318 13:09:22.546400 1 base_controller.go:113] All etcd workers have been terminated 2026-03-18T13:09:22.546673902Z E0318 13:09:22.546637 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:09:22.548033820Z I0318 13:09:22.548000 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-18T13:09:22.548033820Z I0318 13:09:22.548021 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-18T13:09:22.548033820Z I0318 13:09:22.548027 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-18T13:09:22.548078432Z I0318 13:09:22.548057 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-18T13:09:22.548078432Z I0318 13:09:22.548068 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-18T13:09:22.548207695Z E0318 13:09:22.548181 1 base_controller.go:279] "Unhandled Error" err="EtcdStaticResources-StaticResources reconciliation failed: [\"etcd/ns.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-etcd\": context canceled, \"etcd/sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/svc.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/minimal-sm.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/prometheus-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-cr.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"etcd/backups-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"EtcdStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:09:22.549325736Z I0318 13:09:22.549298 1 base_controller.go:123] Shutting down worker of EtcdStaticResources-StaticResources controller ... 2026-03-18T13:09:22.549325736Z I0318 13:09:22.549317 1 base_controller.go:113] All EtcdStaticResources-StaticResources workers have been terminated 2026-03-18T13:09:26.981622731Z I0318 13:09:26.981506 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="3bf9e2b66d8c0b0c8b08c6eac4b93942c924f5035990ec16fb1ded012918e0c6") 2026-03-18T13:09:26.981622731Z I0318 13:09:26.981554 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.crt" changed 2026-03-18T13:09:26.981704033Z I0318 13:09:26.981655 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="333bac9941da575a1d4b38d4f70ac5bad573a8f5c9a54003477b233e8ce35a47") 2026-03-18T13:09:26.981704033Z I0318 13:09:26.981666 1 cmd.go:173] exiting because "/var/run/secrets/serving-cert/tls.key" changed 2026-03-18T13:09:26.981788465Z I0318 13:09:26.981748 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.crt" has been modified (old="", new="2b0ceff4190c551ed714f31a3fc779391adbd3887e37f4ecbc7da3082b4ed2ef") 2026-03-18T13:09:26.981788465Z I0318 13:09:26.981774 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.crt" changed 2026-03-18T13:09:26.981879788Z I0318 13:09:26.981850 1 observer_polling.go:120] Observed file "/var/run/secrets/etcd-client/tls.key" has been modified (old="", new="34225a69d1eda04393cb14f236b9778b4cb962cfe037cf0ed1c303839991be99") 2026-03-18T13:09:26.981879788Z I0318 13:09:26.981868 1 cmd.go:173] exiting because "/var/run/secrets/etcd-client/tls.key" changed 2026-03-18T13:09:26.982030332Z I0318 13:09:26.981987 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-ca/ca-bundle.crt" has been created (hash="32a08b22f76132513f163fde53b4d31df3279b7e392f9053d12bda1074fc950e") 2026-03-18T13:09:26.982030332Z I0318 13:09:26.982006 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-ca/ca-bundle.crt" changed 2026-03-18T13:09:26.982118425Z I0318 13:09:26.982088 1 observer_polling.go:111] Observed file "/var/run/configmaps/etcd-service-ca/service-ca.crt" has been created (hash="062da4887fba5aacd88dba4bd4e91597099df00ce6d843fc1e7b99e4033b9f51") 2026-03-18T13:09:26.982118425Z I0318 13:09:26.982108 1 cmd.go:173] exiting because "/var/run/configmaps/etcd-service-ca/service-ca.crt" changed 2026-03-18T13:09:27.536729236Z I0318 13:09:27.536648 1 observer_polling.go:162] Shutting down file observer 2026-03-18T13:09:56.540631980Z E0318 13:09:56.540520 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:09:56.540631980Z W0318 13:09:56.540563 1 leaderelection.go:84] leader election lost config/pod/openshift-etcd-operator/etcd-operator-8544cbcf9c-hmbpl.json0000640000000000000000000001576315156522230024270 0ustar0000000000000000{"metadata":{"name":"etcd-operator-8544cbcf9c-hmbpl","generateName":"etcd-operator-8544cbcf9c-","namespace":"openshift-etcd-operator","uid":"1bf0ea4e-8b08-488f-b252-39580f46b756","resourceVersion":"8379","creationTimestamp":"2026-03-18T13:06:18Z","labels":{"app":"etcd-operator","pod-template-hash":"8544cbcf9c"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.15/23\"],\"mac_address\":\"0a:58:0a:80:00:0f\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.15/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.15\"\n ],\n \"mac\": \"0a:58:0a:80:00:0f\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"etcd-operator-8544cbcf9c","uid":"f164b7d3-e08b-4dc8-a777-31df0aeeac0b","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"etcd-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"etcd-operator-config","defaultMode":420}},{"name":"etcd-ca","configMap":{"name":"etcd-ca-bundle","defaultMode":420}},{"name":"etcd-service-ca","configMap":{"name":"etcd-service-ca-bundle","defaultMode":420}},{"name":"etcd-client","secret":{"secretName":"etcd-client","defaultMode":420}},{"name":"kube-api-access-4mlkj","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"etcd-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["cluster-etcd-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml","--terminate-on-files=/var/run/secrets/serving-cert/tls.crt","--terminate-on-files=/var/run/secrets/serving-cert/tls.key","--terminate-on-files=/var/run/secrets/etcd-client/tls.crt","--terminate-on-files=/var/run/secrets/etcd-client/tls.key","--terminate-on-files=/var/run/configmaps/etcd-ca/ca-bundle.crt","--terminate-on-files=/var/run/configmaps/etcd-service-ca/service-ca.crt"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"4.18.35"},{"name":"OPENSHIFT_PROFILE","value":"web"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-4mlkj","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":60,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"etcd-operator","serviceAccount":"etcd-operator","nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:12Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.15","podIPs":[{"ip":"10.128.0.15"}],"startTime":"2026-03-18T13:07:49Z","containerStatuses":[{"name":"etcd-operator","state":{"running":{"startedAt":"2026-03-18T13:10:28Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:08:16Z","finishedAt":"2026-03-18T13:09:56Z","containerID":"cri-o://fd0bf4a4bcfb53e14fbaa9e4b5ac94436e182002bb238e07513655ae02a57f1d"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","containerID":"cri-o://cdeecfaffa91bced4d378bfbb335379410c275c90260acdb4404f15430b5fb3b","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"etcd-ca","mountPath":"/var/run/configmaps/etcd-ca"},{"name":"etcd-service-ca","mountPath":"/var/run/configmaps/etcd-service-ca"},{"name":"etcd-client","mountPath":"/var/run/secrets/etcd-client"},{"name":"kube-api-access-4mlkj","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}openshift-apiserver-check-endpoints_current.log0000640000000000000000000002505515156522230034124 0ustar0000000000000000config/pod/openshift-apiserver/logs/apiserver-574f6d5bf6-8krhk2026-03-18T13:09:05.425033371Z W0318 13:09:05.423888 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-18T13:09:05.425033371Z I0318 13:09:05.424319 1 crypto.go:601] Generating new CA for check-endpoints-signer@1773839345 cert, and key in /tmp/serving-cert-2798502101/serving-signer.crt, /tmp/serving-cert-2798502101/serving-signer.key 2026-03-18T13:09:05.948992935Z I0318 13:09:05.948856 1 observer_polling.go:159] Starting file observer 2026-03-18T13:09:05.981927677Z I0318 13:09:05.981861 1 builder.go:304] check-endpoints version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-18T13:09:05.982757281Z I0318 13:09:05.982726 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-2798502101/tls.crt::/tmp/serving-cert-2798502101/tls.key" 2026-03-18T13:09:06.298304248Z I0318 13:09:06.298246 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T13:09:06.299979245Z I0318 13:09:06.299930 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-18T13:09:06.299979245Z I0318 13:09:06.299966 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-18T13:09:06.299994206Z I0318 13:09:06.299986 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-18T13:09:06.300001956Z I0318 13:09:06.299993 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-18T13:09:06.305751237Z I0318 13:09:06.305712 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:09:06.305773377Z W0318 13:09:06.305750 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:09:06.305773377Z W0318 13:09:06.305757 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:09:06.305773377Z W0318 13:09:06.305768 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:09:06.305784538Z W0318 13:09:06.305773 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:09:06.305784538Z W0318 13:09:06.305778 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:09:06.305792988Z W0318 13:09:06.305783 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:09:06.306053585Z I0318 13:09:06.306029 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-18T13:09:06.308606297Z I0318 13:09:06.308580 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:09:06.308667148Z I0318 13:09:06.308657 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:09:06.308759841Z I0318 13:09:06.308744 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:09:06.308793952Z I0318 13:09:06.308782 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:09:06.308919006Z I0318 13:09:06.308717 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:09:06.308919006Z I0318 13:09:06.308913 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:09:06.309049259Z I0318 13:09:06.309032 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:09:06.309093090Z I0318 13:09:06.309080 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:09:06.309253585Z I0318 13:09:06.309082 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-2798502101/tls.crt::/tmp/serving-cert-2798502101/tls.key" 2026-03-18T13:09:06.310114729Z I0318 13:09:06.310083 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2798502101/tls.crt::/tmp/serving-cert-2798502101/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773839345\" (2026-03-18 13:09:04 +0000 UTC to 2026-04-17 13:09:05 +0000 UTC (now=2026-03-18 13:09:06.310034097 +0000 UTC))" 2026-03-18T13:09:06.310285064Z I0318 13:09:06.310261 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839346\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839346\" (2026-03-18 12:09:05 +0000 UTC to 2027-03-18 12:09:05 +0000 UTC (now=2026-03-18 13:09:06.310239403 +0000 UTC))" 2026-03-18T13:09:06.310298204Z I0318 13:09:06.310284 1 secure_serving.go:213] Serving securely on [::]:17698 2026-03-18T13:09:06.310346156Z I0318 13:09:06.310327 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-18T13:09:06.310356826Z I0318 13:09:06.310348 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:09:06.310957643Z I0318 13:09:06.310898 1 base_controller.go:76] Waiting for caches to sync for CheckEndpointsTimeToStart 2026-03-18T13:09:06.311474377Z I0318 13:09:06.311436 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:09:06.311995492Z I0318 13:09:06.311966 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:09:06.312250899Z I0318 13:09:06.312209 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:09:06.412043314Z I0318 13:09:06.411958 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:09:06.412043314Z I0318 13:09:06.412006 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:09:06.412172287Z I0318 13:09:06.412144 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:09:06.412441505Z I0318 13:09:06.412411 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:50:10 +0000 UTC to 2036-03-15 12:50:10 +0000 UTC (now=2026-03-18 13:09:06.412376233 +0000 UTC))" 2026-03-18T13:09:06.412453955Z I0318 13:09:06.412446 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2026-03-19 12:57:27 +0000 UTC (now=2026-03-18 13:09:06.412430795 +0000 UTC))" 2026-03-18T13:09:06.412477676Z I0318 13:09:06.412462 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2027-03-18 12:57:27 +0000 UTC (now=2026-03-18 13:09:06.412451835 +0000 UTC))" 2026-03-18T13:09:06.412486566Z I0318 13:09:06.412478 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2027-03-18 12:57:27 +0000 UTC (now=2026-03-18 13:09:06.412467506 +0000 UTC))" 2026-03-18T13:09:06.412513677Z I0318 13:09:06.412494 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:57:25 +0000 UTC to 2036-03-15 12:57:25 +0000 UTC (now=2026-03-18 13:09:06.412483606 +0000 UTC))" 2026-03-18T13:09:06.412523387Z I0318 13:09:06.412514 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 12:57:25 +0000 UTC to 2026-03-19 12:57:25 +0000 UTC (now=2026-03-18 13:09:06.412504397 +0000 UTC))" 2026-03-18T13:09:06.412698572Z I0318 13:09:06.412675 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2798502101/tls.crt::/tmp/serving-cert-2798502101/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"check-endpoints-signer@1773839345\" (2026-03-18 13:09:04 +0000 UTC to 2026-04-17 13:09:05 +0000 UTC (now=2026-03-18 13:09:06.412657861 +0000 UTC))" 2026-03-18T13:09:06.412829326Z I0318 13:09:06.412808 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839346\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839346\" (2026-03-18 12:09:05 +0000 UTC to 2027-03-18 12:09:05 +0000 UTC (now=2026-03-18 13:09:06.412793255 +0000 UTC))" 2026-03-18T13:09:06.651126950Z I0318 13:09:06.651050 1 reflector.go:368] Caches populated for *v1.CustomResourceDefinition from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:09:06.713491136Z I0318 13:09:06.713295 1 base_controller.go:82] Caches are synced for CheckEndpointsTimeToStart 2026-03-18T13:09:06.713491136Z I0318 13:09:06.713335 1 base_controller.go:119] Starting #1 worker of CheckEndpointsTimeToStart controller ... config/pod/openshift-apiserver/logs/apiserver-574f6d5bf6-8krhk/openshift-apiserver_current.log0000640000000000000000000011317615156522230031131 0ustar00000000000000002026-03-18T13:11:11.769449984Z E0318 13:11:11.769393 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.769479084Z E0318 13:11:11.769305 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:11.769527016Z E0318 13:11:11.769460 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:21.816997194Z E0318 13:11:21.816887 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:21.816997194Z E0318 13:11:21.816900 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:21.816997194Z E0318 13:11:21.816959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:21.816997194Z E0318 13:11:21.816983 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:21.817139068Z E0318 13:11:21.817114 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:21.817174549Z E0318 13:11:21.817150 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:21.817253161Z E0318 13:11:21.817229 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:21.817253161Z E0318 13:11:21.816887 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:21.817275732Z E0318 13:11:21.817255 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:21.817312533Z E0318 13:11:21.817287 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.142981191Z E0318 13:11:25.142887 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.143386 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.143617 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.143881 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.144836 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.144969 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145102 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145164 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145215 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145221 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145321 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145391 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145474 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145572 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145633 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145726 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145780 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.145848 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.146074 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.146222 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.146224 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.146358 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148139189Z E0318 13:11:25.146388 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148204451Z E0318 13:11:25.146402 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.148204451Z E0318 13:11:25.146609 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154382 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154432 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154449 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154568 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154647 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154682 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154732 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154753 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154777 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154805 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154844 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154574 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154959 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154651 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154983 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154999 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154965 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.154655 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.155064 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.155996246Z E0318 13:11:25.155139 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:26.426707133Z E0318 13:11:26.426655 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:26.426815446Z E0318 13:11:26.426791 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:26.426916709Z E0318 13:11:26.426684 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:26.427080534Z E0318 13:11:26.426734 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:26.427167886Z E0318 13:11:26.427146 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.455781585Z E0318 13:11:27.455716 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.456001001Z E0318 13:11:27.455978 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.456156836Z E0318 13:11:27.456115 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.456410043Z E0318 13:11:27.456386 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:27.458680549Z E0318 13:11:27.458630 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:30.316712889Z I0318 13:11:30.316627 1 policy_source.go:224] refreshing policies 2026-03-18T13:11:32.318928798Z I0318 13:11:32.318267 1 policy_source.go:224] refreshing policies 2026-03-18T13:11:41.174974668Z E0318 13:11:41.174905 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.175379890Z E0318 13:11:41.175345 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.175574495Z E0318 13:11:41.175542 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.175733790Z E0318 13:11:41.175700 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.175894795Z E0318 13:11:41.175862 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.344990725Z I0318 13:11:41.344869 1 policy_source.go:224] refreshing policies 2026-03-18T13:11:41.462858547Z E0318 13:11:41.462812 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.463080374Z E0318 13:11:41.463052 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.463285940Z E0318 13:11:41.463257 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.463321331Z E0318 13:11:41.463305 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.463465805Z E0318 13:11:41.463438 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.483303777Z E0318 13:11:41.483248 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.483504763Z E0318 13:11:41.483470 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.483582035Z E0318 13:11:41.483567 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.483647857Z E0318 13:11:41.483628 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.483656568Z E0318 13:11:41.483648 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.483694069Z E0318 13:11:41.483578 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.483767481Z E0318 13:11:41.483749 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.483830733Z E0318 13:11:41.483806 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.483866304Z E0318 13:11:41.483152 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.483980627Z E0318 13:11:41.483946 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.777981223Z E0318 13:11:41.777884 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.778272981Z E0318 13:11:41.778247 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.778360724Z E0318 13:11:41.778311 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.778447916Z E0318 13:11:41.778427 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:41.778697183Z E0318 13:11:41.778666 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:42.345432311Z I0318 13:11:42.345344 1 policy_source.go:224] refreshing policies 2026-03-18T13:11:42.359855187Z I0318 13:11:42.359745 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-18T13:11:42.361856935Z I0318 13:11:42.361793 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 openshift-apiserver-operator_current.log0000640000000000000000000005644715156522230040170 0ustar0000000000000000config/pod/openshift-apiserver-operator/logs/openshift-apiserver-operator-d65958b8-lwfvl2026-03-18T13:11:10.481061788Z I0318 13:11:10.479493 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-apiserver-operator", Name:"openshift-apiserver-operator", UID:"cef8f158-23fd-4a50-a464-7359e8bb947c", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/openshift-apiserver changed: Degraded message changed from "APIServerStaticResourcesDegraded: \"v3.11.0/openshift-apiserver/ns.yaml\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-apiserver)\nAPIServerStaticResourcesDegraded: " to "All is well" 2026-03-18T13:11:11.956360609Z E0318 13:11:11.956288 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T13:11:11.956360609Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401 2026-03-18T13:11:11.956360609Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T13:11:11.956360609Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401 2026-03-18T13:11:11.956360609Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401 2026-03-18T13:11:11.956360609Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401 2026-03-18T13:11:11.956360609Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401 2026-03-18T13:11:11.956360609Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401 2026-03-18T13:11:11.956360609Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401 2026-03-18T13:11:11.956360609Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401 2026-03-18T13:11:11.956360609Z > 2026-03-18T13:11:21.955775519Z E0318 13:11:21.955699 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T13:11:21.955775519Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401 2026-03-18T13:11:21.955775519Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T13:11:21.955775519Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401 2026-03-18T13:11:21.955775519Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401 2026-03-18T13:11:21.955775519Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401 2026-03-18T13:11:21.955775519Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401 2026-03-18T13:11:21.955775519Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401 2026-03-18T13:11:21.955775519Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401 2026-03-18T13:11:21.955775519Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401 2026-03-18T13:11:21.955775519Z > 2026-03-18T13:11:22.225522865Z I0318 13:11:22.225028 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:11:23.544745122Z E0318 13:11:23.544658 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T13:11:23.544745122Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401 2026-03-18T13:11:23.544745122Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T13:11:23.544745122Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401 2026-03-18T13:11:23.544745122Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401 2026-03-18T13:11:23.544745122Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401 2026-03-18T13:11:23.544745122Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401 2026-03-18T13:11:23.544745122Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401 2026-03-18T13:11:23.544745122Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401 2026-03-18T13:11:23.544745122Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401 2026-03-18T13:11:23.544745122Z > 2026-03-18T13:11:25.345789854Z E0318 13:11:25.345692 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T13:11:25.345789854Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401 2026-03-18T13:11:25.345789854Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T13:11:25.345789854Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401 2026-03-18T13:11:25.345789854Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401 2026-03-18T13:11:25.345789854Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401 2026-03-18T13:11:25.345789854Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401 2026-03-18T13:11:25.345789854Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401 2026-03-18T13:11:25.345789854Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401 2026-03-18T13:11:25.345789854Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401 2026-03-18T13:11:25.345789854Z > 2026-03-18T13:11:32.254028916Z E0318 13:11:32.253504 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T13:11:32.254028916Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401 2026-03-18T13:11:32.254028916Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T13:11:32.254028916Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401 2026-03-18T13:11:32.254028916Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401 2026-03-18T13:11:32.254028916Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401 2026-03-18T13:11:32.254028916Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401 2026-03-18T13:11:32.254028916Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401 2026-03-18T13:11:32.254028916Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401 2026-03-18T13:11:32.254028916Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401 2026-03-18T13:11:32.254028916Z > 2026-03-18T13:11:35.940636890Z I0318 13:11:35.940586 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:11:36.527391316Z E0318 13:11:36.527309 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T13:11:36.527391316Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401 2026-03-18T13:11:36.527391316Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T13:11:36.527391316Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401 2026-03-18T13:11:36.527391316Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401 2026-03-18T13:11:36.527391316Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401 2026-03-18T13:11:36.527391316Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401 2026-03-18T13:11:36.527391316Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401 2026-03-18T13:11:36.527391316Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401 2026-03-18T13:11:36.527391316Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401 2026-03-18T13:11:36.527391316Z > 2026-03-18T13:11:37.211696717Z I0318 13:11:37.209726 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:11:37.361691016Z I0318 13:11:37.361284 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:11:38.045965817Z E0318 13:11:38.045534 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T13:11:38.045965817Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401 2026-03-18T13:11:38.045965817Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T13:11:38.045965817Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401 2026-03-18T13:11:38.045965817Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401 2026-03-18T13:11:38.045965817Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401 2026-03-18T13:11:38.045965817Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401 2026-03-18T13:11:38.045965817Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401 2026-03-18T13:11:38.045965817Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401 2026-03-18T13:11:38.045965817Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401 2026-03-18T13:11:38.045965817Z > 2026-03-18T13:11:42.219135366Z E0318 13:11:42.219037 1 base_controller.go:279] "Unhandled Error" err=< 2026-03-18T13:11:42.219135366Z openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401 2026-03-18T13:11:42.219135366Z apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401 2026-03-18T13:11:42.219135366Z apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401 2026-03-18T13:11:42.219135366Z apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401 2026-03-18T13:11:42.219135366Z apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401 2026-03-18T13:11:42.219135366Z apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401 2026-03-18T13:11:42.219135366Z apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401 2026-03-18T13:11:42.219135366Z apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401 2026-03-18T13:11:42.219135366Z apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401 2026-03-18T13:11:42.219135366Z > 2026-03-18T13:11:43.945910796Z I0318 13:11:43.945213 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:11:45.403399314Z I0318 13:11:45.403324 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:11:45.456173787Z I0318 13:11:45.456106 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:11:46.154777941Z I0318 13:11:46.154709 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:11:46.567975807Z I0318 13:11:46.564964 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:11:47.380977952Z I0318 13:11:47.380785 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. 2026-03-18T13:11:47.401716540Z I0318 13:11:47.401619 1 connectivity_check_controller.go:172] ConnectivityCheckController is waiting for transition to desired version (4.18.35) to be completed. kube-scheduler-operator-container_current.log0000640000000000000000000001021515156522230042771 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-4bfbf2026-03-18T13:10:28.575557175Z I0318 13:10:28.575419 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:10:28.575557175Z I0318 13:10:28.575527 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:10:28.578630252Z I0318 13:10:28.578599 1 observer_polling.go:159] Starting file observer 2026-03-18T13:10:35.323815857Z I0318 13:10:35.323251 1 builder.go:304] openshift-cluster-kube-scheduler-operator version 4.18.0-202603040208.p2.g4e99db6.assembly.stream.el9-4e99db6-4e99db62cea1d2ca48765230c6f5663d1f2c2702 2026-03-18T13:10:35.963996827Z I0318 13:10:35.961926 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:10:35.963996827Z W0318 13:10:35.961978 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:10:35.963996827Z W0318 13:10:35.961984 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:10:35.963996827Z W0318 13:10:35.961990 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:10:35.963996827Z W0318 13:10:35.961998 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:10:35.963996827Z W0318 13:10:35.962001 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:10:35.963996827Z W0318 13:10:35.962005 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:10:35.967009433Z I0318 13:10:35.966961 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:10:35.967407054Z I0318 13:10:35.967330 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:10:35.967688192Z I0318 13:10:35.967647 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:10:35.969960286Z I0318 13:10:35.969907 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:10:35.971897621Z I0318 13:10:35.970354 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:10:35.971897621Z I0318 13:10:35.971360 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:10:35.971897621Z I0318 13:10:35.970387 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:10:35.971897621Z I0318 13:10:35.971414 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:10:35.971897621Z I0318 13:10:35.970404 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:10:35.971897621Z I0318 13:10:35.971429 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:35.971897621Z I0318 13:10:35.971748 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-scheduler-operator/openshift-cluster-kube-scheduler-operator-lock... 2026-03-18T13:10:36.072342507Z I0318 13:10:36.072236 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:36.072342507Z I0318 13:10:36.072320 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:10:36.072500402Z I0318 13:10:36.072471 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController kube-scheduler-operator-container_previous.log0000640000000000000000000004542215156522230043173 0ustar0000000000000000config/pod/openshift-kube-scheduler-operator/logs/openshift-kube-scheduler-operator-dddff6458-4bfbf2026-03-18T13:09:04.784361468Z W0318 13:09:04.783631 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-18T13:09:04.784361468Z W0318 13:09:04.783636 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-18T13:09:04.826303003Z I0318 13:09:04.826232 1 prune_controller.go:277] Nothing to prune 2026-03-18T13:09:04.830259554Z I0318 13:09:04.829268 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-18T13:08:19Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-18T13:08:37Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-18T13:08:20Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-18T13:08:19Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-18T13:08:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-18T13:09:04.857027273Z I0318 13:09:04.856687 1 status_controller.go:225] clusteroperator/kube-scheduler diff {"status":{"conditions":[{"lastTransitionTime":"2026-03-18T13:08:19Z","message":"NodeControllerDegraded: All master nodes are ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-03-18T13:08:37Z","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4","reason":"NodeInstaller","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-03-18T13:08:20Z","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4","reason":"StaticPods_ZeroNodesActive","status":"False","type":"Available"},{"lastTransitionTime":"2026-03-18T13:08:19Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2026-03-18T13:08:18Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}} 2026-03-18T13:09:04.857027273Z I0318 13:09:04.856950 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"98d9c021-6a4e-4a8f-9cad-242f91ff2a75", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/kube-scheduler changed: Progressing message changed from "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3" to "NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4",Available message changed from "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3" to "StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4" 2026-03-18T13:09:04.890020697Z E0318 13:09:04.885518 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_kube-scheduler reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"kube-scheduler\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T13:09:05.961067063Z I0318 13:09:05.960752 1 request.go:700] Waited for 1.107203508s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods/installer-4-master-0 2026-03-18T13:09:06.962228483Z I0318 13:09:06.961324 1 request.go:700] Waited for 1.111687735s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa 2026-03-18T13:09:07.168791658Z I0318 13:09:07.168473 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-scheduler-operator", Name:"openshift-kube-scheduler-operator", UID:"98d9c021-6a4e-4a8f-9cad-242f91ff2a75", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodCreated' Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing 2026-03-18T13:09:08.085657367Z I0318 13:09:08.085581 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-03-18T13:09:12.091625061Z I0318 13:09:12.088985 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-03-18T13:09:13.385525768Z I0318 13:09:13.385112 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Pending phase 2026-03-18T13:09:17.102753995Z I0318 13:09:17.102690 1 installer_controller.go:550] "master-0" is in transition to 4, but has not made progress because installer is not finished, but in Running phase 2026-03-18T13:09:42.170206442Z I0318 13:09:42.170111 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="2c240ae7180b2f497e4fbe04f18cb15b905b8aa9dba31ee538c2d6eb8957aea0") 2026-03-18T13:09:42.170206442Z W0318 13:09:42.170161 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-18T13:09:42.170281204Z I0318 13:09:42.170214 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="eca4132a6f84b5bf0ec2e26539bf6dd1e9bb8849abe417775102839e0f879865") 2026-03-18T13:09:42.170402677Z I0318 13:09:42.170334 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-18T13:09:42.170444409Z I0318 13:09:42.170420 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-18T13:09:42.170488340Z I0318 13:09:42.170469 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-18T13:09:42.170763098Z I0318 13:09:42.170728 1 base_controller.go:181] Shutting down kube-scheduler-Node ... 2026-03-18T13:09:42.170763098Z I0318 13:09:42.170748 1 base_controller.go:181] Shutting down StatusSyncer_kube-scheduler ... 2026-03-18T13:09:42.170763098Z I0318 13:09:42.170753 1 base_controller.go:159] All StatusSyncer_kube-scheduler post start hooks have been terminated 2026-03-18T13:09:42.170777058Z I0318 13:09:42.170763 1 base_controller.go:181] Shutting down cluster-kube-scheduler-operator-UnsupportedConfigOverrides ... 2026-03-18T13:09:42.170777058Z I0318 13:09:42.170773 1 base_controller.go:181] Shutting down kube-controller-manager-RemoveStaleConditions ... 2026-03-18T13:09:42.170975103Z I0318 13:09:42.170916 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-18T13:09:42.175455419Z I0318 13:09:42.175398 1 base_controller.go:181] Shutting down kube-scheduler ... 2026-03-18T13:09:42.175477740Z I0318 13:09:42.175441 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-18T13:09:42.175487610Z I0318 13:09:42.175472 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-18T13:09:42.175519081Z I0318 13:09:42.175499 1 base_controller.go:181] Shutting down kube-scheduler-InstallerState ... 2026-03-18T13:09:42.175530871Z I0318 13:09:42.175521 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-18T13:09:42.175610313Z I0318 13:09:42.175566 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-18T13:09:42.175610313Z I0318 13:09:42.175598 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-18T13:09:42.175626564Z I0318 13:09:42.175615 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-18T13:09:42.175711346Z I0318 13:09:42.175677 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:09:42.175711346Z I0318 13:09:42.175700 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:09:42.176338274Z I0318 13:09:42.176301 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-18T13:09:42.177563398Z I0318 13:09:42.176720 1 base_controller.go:123] Shutting down worker of kube-scheduler-Node controller ... 2026-03-18T13:09:42.177670931Z I0318 13:09:42.177615 1 base_controller.go:113] All kube-scheduler-Node workers have been terminated 2026-03-18T13:09:42.177719022Z I0318 13:09:42.177703 1 controller_manager.go:54] kube-scheduler-Node controller terminated 2026-03-18T13:09:42.177763534Z I0318 13:09:42.177729 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-18T13:09:42.177802955Z I0318 13:09:42.176726 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-scheduler controller ... 2026-03-18T13:09:42.177842906Z I0318 13:09:42.177828 1 base_controller.go:113] All StatusSyncer_kube-scheduler workers have been terminated 2026-03-18T13:09:42.177875567Z I0318 13:09:42.177707 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-18T13:09:42.177906538Z I0318 13:09:42.176854 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-18T13:09:42.177977050Z I0318 13:09:42.176871 1 base_controller.go:181] Shutting down GuardController ... 2026-03-18T13:09:42.178019781Z I0318 13:09:42.176956 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-18T13:09:42.178064882Z I0318 13:09:42.178041 1 base_controller.go:123] Shutting down worker of kube-scheduler controller ... 2026-03-18T13:09:42.178064882Z I0318 13:09:42.178057 1 base_controller.go:113] All kube-scheduler workers have been terminated 2026-03-18T13:09:42.178113283Z I0318 13:09:42.178093 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-18T13:09:42.178113283Z I0318 13:09:42.178093 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-18T13:09:42.178126524Z I0318 13:09:42.178118 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-18T13:09:42.178126524Z I0318 13:09:42.177356 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-487171860/tls.crt::/tmp/serving-cert-487171860/tls.key" 2026-03-18T13:09:42.178140854Z I0318 13:09:42.177415 1 base_controller.go:181] Shutting down Installer ... 2026-03-18T13:09:42.178152075Z I0318 13:09:42.178139 1 base_controller.go:113] All Installer workers have been terminated 2026-03-18T13:09:42.178152075Z I0318 13:09:42.178146 1 controller_manager.go:54] Installer controller terminated 2026-03-18T13:09:42.178152075Z I0318 13:09:42.177438 1 base_controller.go:181] Shutting down PruneController ... 2026-03-18T13:09:42.178166965Z I0318 13:09:42.178154 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-18T13:09:42.178166965Z I0318 13:09:42.178160 1 controller_manager.go:54] PruneController controller terminated 2026-03-18T13:09:42.178166965Z I0318 13:09:42.177497 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-18T13:09:42.178180185Z I0318 13:09:42.176305 1 base_controller.go:123] Shutting down worker of cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller ... 2026-03-18T13:09:42.178180185Z I0318 13:09:42.178175 1 base_controller.go:113] All cluster-kube-scheduler-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:09:42.178192796Z I0318 13:09:42.178181 1 controller_manager.go:54] cluster-kube-scheduler-operator-UnsupportedConfigOverrides controller terminated 2026-03-18T13:09:42.178204926Z I0318 13:09:42.177916 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-18T13:09:42.178204926Z I0318 13:09:42.178201 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-18T13:09:42.178217336Z I0318 13:09:42.178208 1 controller_manager.go:54] RevisionController controller terminated 2026-03-18T13:09:42.178217336Z I0318 13:09:42.177038 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-18T13:09:42.178229287Z I0318 13:09:42.178220 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-18T13:09:42.178240547Z I0318 13:09:42.178226 1 controller_manager.go:54] GuardController controller terminated 2026-03-18T13:09:42.178251827Z I0318 13:09:42.178243 1 base_controller.go:123] Shutting down worker of kube-controller-manager-RemoveStaleConditions controller ... 2026-03-18T13:09:42.178262938Z I0318 13:09:42.178253 1 base_controller.go:113] All kube-controller-manager-RemoveStaleConditions workers have been terminated 2026-03-18T13:09:42.178363220Z I0318 13:09:42.178344 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-18T13:09:42.179003738Z I0318 13:09:42.178417 1 base_controller.go:181] Shutting down kube-scheduler-StaticPodState ... 2026-03-18T13:09:42.179003738Z I0318 13:09:42.178438 1 base_controller.go:123] Shutting down worker of kube-scheduler-InstallerState controller ... 2026-03-18T13:09:42.179003738Z I0318 13:09:42.178564 1 base_controller.go:113] All kube-scheduler-InstallerState workers have been terminated 2026-03-18T13:09:42.179003738Z I0318 13:09:42.178628 1 controller_manager.go:54] kube-scheduler-InstallerState controller terminated 2026-03-18T13:09:42.179003738Z I0318 13:09:42.178646 1 base_controller.go:123] Shutting down worker of kube-scheduler-StaticPodState controller ... 2026-03-18T13:09:42.179003738Z I0318 13:09:42.178656 1 base_controller.go:113] All kube-scheduler-StaticPodState workers have been terminated 2026-03-18T13:09:42.179003738Z I0318 13:09:42.178663 1 controller_manager.go:54] kube-scheduler-StaticPodState controller terminated 2026-03-18T13:09:42.179119502Z I0318 13:09:42.179090 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-18T13:09:42.179182563Z I0318 13:09:42.179152 1 builder.go:335] server exited 2026-03-18T13:09:42.179218254Z I0318 13:09:42.179122 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-18T13:09:42.179278996Z I0318 13:09:42.179245 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:09:42.179355948Z I0318 13:09:42.179329 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-18T13:09:42.181048386Z E0318 13:09:42.181027 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-18T13:09:42.181955391Z I0318 13:09:42.181921 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-18T13:09:42.181993092Z I0318 13:09:42.181982 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-18T13:09:42.182070484Z I0318 13:09:42.182060 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-18T13:09:42.182366803Z E0318 13:09:42.182327 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-scheduler/sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/openshift-kube-scheduler-sa\": context canceled, \"assets/kube-scheduler/localhost-recovery-client-crb.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-scheduler/localhost-recovery-sa.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:09:42.182446955Z I0318 13:09:42.182408 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-18T13:09:42.182455385Z I0318 13:09:42.182444 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-18T13:09:42.183416452Z E0318 13:09:42.183363 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:09:42.183439973Z I0318 13:09:42.183419 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-18T13:09:42.183439973Z I0318 13:09:42.183436 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-18T13:09:42.185349046Z I0318 13:09:42.185294 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-18T13:09:42.185349046Z I0318 13:09:42.185328 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-18T13:09:42.185349046Z I0318 13:09:42.185341 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-18T13:09:47.169124456Z I0318 13:09:47.169034 1 observer_polling.go:162] Shutting down file observer 2026-03-18T13:10:16.175144233Z E0318 13:10:16.175026 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:10:16.175144233Z W0318 13:10:16.175096 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-4bfbf.json0000640000000000000000000001365315156522230032030 0ustar0000000000000000{"metadata":{"name":"openshift-kube-scheduler-operator-dddff6458-4bfbf","generateName":"openshift-kube-scheduler-operator-dddff6458-","namespace":"openshift-kube-scheduler-operator","uid":"93ea3c78-dede-468f-89a5-551133f794c5","resourceVersion":"8381","creationTimestamp":"2026-03-18T13:06:18Z","labels":{"app":"openshift-kube-scheduler-operator","pod-template-hash":"dddff6458"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.25/23\"],\"mac_address\":\"0a:58:0a:80:00:19\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.25/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.25\"\n ],\n \"mac\": \"0a:58:0a:80:00:19\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"openshift-kube-scheduler-operator-dddff6458","uid":"4d839065-8840-4f80-9a0b-3b161882752a","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-scheduler-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"openshift-kube-scheduler-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-scheduler-operator-container","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"openshift-kube-scheduler-operator","serviceAccount":"openshift-kube-scheduler-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:12Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.25","podIPs":[{"ip":"10.128.0.25"}],"startTime":"2026-03-18T13:07:49Z","containerStatuses":[{"name":"kube-scheduler-operator-container","state":{"running":{"startedAt":"2026-03-18T13:10:28Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:08:16Z","finishedAt":"2026-03-18T13:10:16Z","containerID":"cri-o://ef423dc670cb4c823cf16513eca393eb2237d93c1c3d72d4a3125b276f8fdce7"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://ecac9e54fbb68035c123d989f9fe8209b26c2fc9d7913909adf91d340c827099","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-kube-scheduler/logs/installer-4-master-0/installer_current.log0000640000000000000000000001444615156522230027172 0ustar00000000000000002026-03-18T13:09:11.220915535Z I0318 13:09:11.220692 1 cmd.go:95] &{ true {false} installer true map[cert-dir:0xc00045fd60 cert-secrets:0xc00045f720 configmaps:0xc0007c7ae0 namespace:0xc0007c7900 optional-configmaps:0xc0007c7c20 optional-secrets:0xc0007c7b80 pod:0xc0007c79a0 pod-manifest-dir:0xc0007c7d60 resource-dir:0xc0007c7cc0 revision:0xc0007c7860 secrets:0xc0007c7a40 v:0xc000566c80] [0xc000566c80 0xc0007c7860 0xc0007c7900 0xc0007c79a0 0xc0007c7cc0 0xc0007c7d60 0xc0007c7ae0 0xc0007c7c20 0xc0007c7b80 0xc0007c7a40 0xc00045fd60 0xc00045f720] [] map[cert-configmaps:0xc00045f9a0 cert-dir:0xc00045fd60 cert-secrets:0xc00045f720 configmaps:0xc0007c7ae0 help:0xc000567040 kubeconfig:0xc0007c77c0 log-flush-frequency:0xc000566be0 namespace:0xc0007c7900 optional-cert-configmaps:0xc00045fc20 optional-cert-secrets:0xc00045fae0 optional-configmaps:0xc0007c7c20 optional-secrets:0xc0007c7b80 pod:0xc0007c79a0 pod-manifest-dir:0xc0007c7d60 pod-manifests-lock-file:0xc0007c7ea0 resource-dir:0xc0007c7cc0 revision:0xc0007c7860 secrets:0xc0007c7a40 timeout-duration:0xc0007c7e00 v:0xc000566c80 vmodule:0xc000566d20] [0xc0007c77c0 0xc0007c7860 0xc0007c7900 0xc0007c79a0 0xc0007c7a40 0xc0007c7ae0 0xc0007c7b80 0xc0007c7c20 0xc0007c7cc0 0xc0007c7d60 0xc0007c7e00 0xc0007c7ea0 0xc00045f720 0xc00045f9a0 0xc00045fae0 0xc00045fc20 0xc00045fd60 0xc000566be0 0xc000566c80 0xc000566d20 0xc000567040] [0xc00045f9a0 0xc00045fd60 0xc00045f720 0xc0007c7ae0 0xc000567040 0xc0007c77c0 0xc000566be0 0xc0007c7900 0xc00045fc20 0xc00045fae0 0xc0007c7c20 0xc0007c7b80 0xc0007c79a0 0xc0007c7d60 0xc0007c7ea0 0xc0007c7cc0 0xc0007c7860 0xc0007c7a40 0xc0007c7e00 0xc000566c80 0xc000566d20] map[104:0xc000567040 118:0xc000566c80] [] -1 0 0xc0006035f0 true 0x223dac0 []} 2026-03-18T13:09:11.220915535Z I0318 13:09:11.220902 1 cmd.go:96] (*installerpod.InstallOptions)(0xc00082c4e0)({ 2026-03-18T13:09:11.220915535Z KubeConfig: (string) "", 2026-03-18T13:09:11.220915535Z KubeClient: (kubernetes.Interface) , 2026-03-18T13:09:11.220915535Z Revision: (string) (len=1) "4", 2026-03-18T13:09:11.220915535Z NodeName: (string) "", 2026-03-18T13:09:11.220915535Z Namespace: (string) (len=24) "openshift-kube-scheduler", 2026-03-18T13:09:11.220915535Z Clock: (clock.RealClock) { 2026-03-18T13:09:11.220915535Z }, 2026-03-18T13:09:11.220915535Z PodConfigMapNamePrefix: (string) (len=18) "kube-scheduler-pod", 2026-03-18T13:09:11.220915535Z SecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T13:09:11.220915535Z (string) (len=31) "localhost-recovery-client-token" 2026-03-18T13:09:11.220915535Z }, 2026-03-18T13:09:11.220915535Z OptionalSecretNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T13:09:11.220915535Z (string) (len=12) "serving-cert" 2026-03-18T13:09:11.220915535Z }, 2026-03-18T13:09:11.220915535Z ConfigMapNamePrefixes: ([]string) (len=5 cap=8) { 2026-03-18T13:09:11.220915535Z (string) (len=18) "kube-scheduler-pod", 2026-03-18T13:09:11.220915535Z (string) (len=6) "config", 2026-03-18T13:09:11.220915535Z (string) (len=17) "serviceaccount-ca", 2026-03-18T13:09:11.220915535Z (string) (len=20) "scheduler-kubeconfig", 2026-03-18T13:09:11.220915535Z (string) (len=37) "kube-scheduler-cert-syncer-kubeconfig" 2026-03-18T13:09:11.220915535Z }, 2026-03-18T13:09:11.220915535Z OptionalConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T13:09:11.220915535Z (string) (len=16) "policy-configmap" 2026-03-18T13:09:11.220915535Z }, 2026-03-18T13:09:11.220915535Z CertSecretNames: ([]string) (len=1 cap=1) { 2026-03-18T13:09:11.220915535Z (string) (len=30) "kube-scheduler-client-cert-key" 2026-03-18T13:09:11.220915535Z }, 2026-03-18T13:09:11.220915535Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-18T13:09:11.220915535Z CertConfigMapNamePrefixes: ([]string) , 2026-03-18T13:09:11.220915535Z OptionalCertConfigMapNamePrefixes: ([]string) , 2026-03-18T13:09:11.220915535Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-scheduler-certs", 2026-03-18T13:09:11.220915535Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T13:09:11.220915535Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T13:09:11.220915535Z Timeout: (time.Duration) 2m0s, 2026-03-18T13:09:11.220915535Z StaticPodManifestsLockFile: (string) "", 2026-03-18T13:09:11.220915535Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T13:09:11.220915535Z KubeletVersion: (string) "" 2026-03-18T13:09:11.220915535Z }) 2026-03-18T13:09:11.221546842Z I0318 13:09:11.221522 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T13:09:12.101580960Z I0318 13:09:12.096699 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T13:09:12.101580960Z I0318 13:09:12.096848 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:09:12.101580960Z I0318 13:09:12.096862 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:09:12.488002362Z I0318 13:09:12.487492 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-18T13:09:36.493206639Z W0318 13:09:36.493092 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:09:56.488011157Z W0318 13:09:56.487892 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:10:16.489536711Z W0318 13:10:16.489439 1 cmd.go:470] Error getting installer pods on current node master-0: Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) 2026-03-18T13:10:27.968058661Z I0318 13:10:27.967987 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting 2026-03-18T13:10:27.968117652Z F0318 13:10:27.968035 1 cmd.go:109] timed out waiting for the condition config/pod/openshift-kube-scheduler/installer-4-master-0.json0000640000000000000000000001635715156522230022662 0ustar0000000000000000{"metadata":{"name":"installer-4-master-0","namespace":"openshift-kube-scheduler","uid":"245f3af1-ccfb-4191-9a34-00852e52a73d","resourceVersion":"8389","creationTimestamp":"2026-03-18T13:09:07Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.54/23\"],\"mac_address\":\"0a:58:0a:80:00:36\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.54/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.54\"\n ],\n \"mac\": \"0a:58:0a:80:00:36\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-4","uid":"e2238fb6-c2cd-40c7-b402-63192b578808"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","command":["cluster-kube-scheduler-operator","installer"],"args":["-v=2","--revision=4","--namespace=openshift-kube-scheduler","--pod=kube-scheduler-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-scheduler-pod","--configmaps=config","--configmaps=serviceaccount-ca","--optional-configmaps=policy-configmap","--configmaps=scheduler-kubeconfig","--configmaps=kube-scheduler-cert-syncer-kubeconfig","--optional-secrets=serving-cert","--secrets=localhost-recovery-client-token","--cert-dir=/etc/kubernetes/static-pod-resources/kube-scheduler-certs","--cert-secrets=kube-scheduler-client-cert-key"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:30Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:09:07Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:28Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:28Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:09:07Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.54","podIPs":[{"ip":"10.128.0.54"}],"startTime":"2026-03-18T13:09:07Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"es: ([]string) \u003cnil\u003e,\n OptionalCertConfigMapNamePrefixes: ([]string) \u003cnil\u003e,\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-scheduler-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0318 13:09:11.221522 1 cmd.go:413] Getting controller reference for node master-0\nI0318 13:09:12.096699 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0318 13:09:12.096848 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0318 13:09:12.096862 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0318 13:09:12.487492 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nW0318 13:09:36.493092 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0318 13:09:56.487892 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nW0318 13:10:16.489439 1 cmd.go:470] Error getting installer pods on current node master-0: Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-scheduler/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\nI0318 13:10:27.967987 1 cmd.go:506] Pod container: installer state for node master-0 is not terminated, waiting\nF0318 13:10:27.968035 1 cmd.go:109] timed out waiting for the condition\n","startedAt":"2026-03-18T13:09:10Z","finishedAt":"2026-03-18T13:10:27Z","containerID":"cri-o://2590a481a145d76e2b7df7ede04cc027447c99a8ab51376b367af34e50c7be34"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","containerID":"cri-o://2590a481a145d76e2b7df7ede04cc027447c99a8ab51376b367af34e50c7be34","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_current.log0000640000000000000000000004536615156522230030234 0ustar00000000000000002026-03-18T13:10:33.591026700Z weight: 0 2026-03-18T13:10:33.591026700Z - name: VolumeZone 2026-03-18T13:10:33.591026700Z weight: 0 2026-03-18T13:10:33.591026700Z - name: PodTopologySpread 2026-03-18T13:10:33.591026700Z weight: 2 2026-03-18T13:10:33.591026700Z - name: InterPodAffinity 2026-03-18T13:10:33.591026700Z weight: 2 2026-03-18T13:10:33.591026700Z - name: DefaultPreemption 2026-03-18T13:10:33.591026700Z weight: 0 2026-03-18T13:10:33.591026700Z - name: NodeResourcesBalancedAllocation 2026-03-18T13:10:33.591026700Z weight: 1 2026-03-18T13:10:33.591026700Z - name: ImageLocality 2026-03-18T13:10:33.591026700Z weight: 1 2026-03-18T13:10:33.591026700Z - name: DefaultBinder 2026-03-18T13:10:33.591026700Z weight: 0 2026-03-18T13:10:33.591026700Z permit: {} 2026-03-18T13:10:33.591026700Z postBind: {} 2026-03-18T13:10:33.591026700Z postFilter: {} 2026-03-18T13:10:33.591026700Z preBind: {} 2026-03-18T13:10:33.591026700Z preEnqueue: {} 2026-03-18T13:10:33.591026700Z preFilter: {} 2026-03-18T13:10:33.591026700Z preScore: {} 2026-03-18T13:10:33.591026700Z queueSort: {} 2026-03-18T13:10:33.591026700Z reserve: {} 2026-03-18T13:10:33.591026700Z score: {} 2026-03-18T13:10:33.591026700Z schedulerName: default-scheduler 2026-03-18T13:10:33.591026700Z > 2026-03-18T13:10:33.592710158Z I0318 13:10:33.592659 1 server.go:172] "Starting Kubernetes Scheduler" version="v1.31.14" 2026-03-18T13:10:33.592710158Z I0318 13:10:33.592692 1 server.go:174] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" 2026-03-18T13:10:33.599857830Z I0318 13:10:33.599630 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:10:33.599857830Z I0318 13:10:33.599711 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:10:33.599857830Z I0318 13:10:33.599732 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:10:33.599857830Z I0318 13:10:33.599777 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:10:33.599929402Z I0318 13:10:33.599899 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773839377\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773839377\" (2026-03-18 12:09:37 +0000 UTC to 2027-03-18 12:09:37 +0000 UTC (now=2026-03-18 13:10:33.599865511 +0000 UTC))" 2026-03-18T13:10:33.600100087Z I0318 13:10:33.600041 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839377\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839377\" (2026-03-18 12:09:37 +0000 UTC to 2029-03-18 12:09:37 +0000 UTC (now=2026-03-18 13:10:33.600032355 +0000 UTC))" 2026-03-18T13:10:33.600100087Z I0318 13:10:33.600090 1 secure_serving.go:213] Serving securely on [::]:10259 2026-03-18T13:10:33.600279882Z I0318 13:10:33.600231 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:10:33.600293723Z I0318 13:10:33.600274 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:33.600397026Z I0318 13:10:33.600368 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" 2026-03-18T13:10:33.600704694Z I0318 13:10:33.600683 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:10:33.606791787Z I0318 13:10:33.606722 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-18T13:10:33.612539250Z I0318 13:10:33.612489 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-18T13:10:33.613141017Z I0318 13:10:33.613117 1 reflector.go:368] Caches populated for *v1.CSIDriver from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.613787185Z I0318 13:10:33.613758 1 reflector.go:368] Caches populated for *v1.CSIStorageCapacity from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.615678019Z I0318 13:10:33.615251 1 reflector.go:368] Caches populated for *v1.ConfigMap from runtime/asm_amd64.s:1695 2026-03-18T13:10:33.618208520Z I0318 13:10:33.618082 1 reflector.go:368] Caches populated for *v1.PodDisruptionBudget from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.618406766Z I0318 13:10:33.618355 1 reflector.go:368] Caches populated for *v1.VolumeAttachment from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.618812347Z I0318 13:10:33.618538 1 reflector.go:368] Caches populated for *v1.StorageClass from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.618812347Z I0318 13:10:33.618637 1 reflector.go:368] Caches populated for *v1.CSINode from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.618812347Z I0318 13:10:33.618691 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.620037432Z I0318 13:10:33.619878 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.620139275Z I0318 13:10:33.620116 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.620187566Z I0318 13:10:33.620118 1 reflector.go:368] Caches populated for *v1.StatefulSet from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.620198097Z I0318 13:10:33.620187 1 node_tree.go:65] "Added node in listed group to NodeTree" node="master-0" zone="" 2026-03-18T13:10:33.621151784Z I0318 13:10:33.621092 1 reflector.go:368] Caches populated for *v1.PersistentVolume from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.621772371Z I0318 13:10:33.621745 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.630492478Z I0318 13:10:33.630428 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.630984772Z I0318 13:10:33.630951 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.632178306Z I0318 13:10:33.631907 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160 2026-03-18T13:10:33.700375099Z I0318 13:10:33.700278 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:10:33.700375099Z I0318 13:10:33.700355 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:33.700403819Z I0318 13:10:33.700298 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:10:33.700471571Z I0318 13:10:33.700317 1 leaderelection.go:254] attempting to acquire leader lease kube-system/kube-scheduler... 2026-03-18T13:10:33.700678947Z I0318 13:10:33.700630 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 12:57:25 +0000 UTC to 2026-03-19 12:57:25 +0000 UTC (now=2026-03-18 13:10:33.700606055 +0000 UTC))" 2026-03-18T13:10:33.700897743Z I0318 13:10:33.700857 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773839377\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773839377\" (2026-03-18 12:09:37 +0000 UTC to 2027-03-18 12:09:37 +0000 UTC (now=2026-03-18 13:10:33.700843912 +0000 UTC))" 2026-03-18T13:10:33.701048398Z I0318 13:10:33.701020 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839377\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839377\" (2026-03-18 12:09:37 +0000 UTC to 2029-03-18 12:09:37 +0000 UTC (now=2026-03-18 13:10:33.701009947 +0000 UTC))" 2026-03-18T13:10:33.701185932Z I0318 13:10:33.701161 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:50:10 +0000 UTC to 2036-03-15 12:50:10 +0000 UTC (now=2026-03-18 13:10:33.701152411 +0000 UTC))" 2026-03-18T13:10:33.701204432Z I0318 13:10:33.701187 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2026-03-19 12:57:27 +0000 UTC (now=2026-03-18 13:10:33.701179701 +0000 UTC))" 2026-03-18T13:10:33.701224713Z I0318 13:10:33.701207 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2027-03-18 12:57:27 +0000 UTC (now=2026-03-18 13:10:33.701200512 +0000 UTC))" 2026-03-18T13:10:33.701253144Z I0318 13:10:33.701235 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2027-03-18 12:57:27 +0000 UTC (now=2026-03-18 13:10:33.701228323 +0000 UTC))" 2026-03-18T13:10:33.701272854Z I0318 13:10:33.701252 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:57:25 +0000 UTC to 2036-03-15 12:57:25 +0000 UTC (now=2026-03-18 13:10:33.701246683 +0000 UTC))" 2026-03-18T13:10:33.701282554Z I0318 13:10:33.701272 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 12:57:25 +0000 UTC to 2026-03-19 12:57:25 +0000 UTC (now=2026-03-18 13:10:33.701266514 +0000 UTC))" 2026-03-18T13:10:33.701456989Z I0318 13:10:33.701423 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/kubernetes/kube-scheduler.crt::/var/run/kubernetes/kube-scheduler.key" certDetail="\"localhost@1773839377\" [serving] validServingFor=[127.0.0.1,localhost,localhost] issuer=\"localhost-ca@1773839377\" (2026-03-18 12:09:37 +0000 UTC to 2027-03-18 12:09:37 +0000 UTC (now=2026-03-18 13:10:33.701414068 +0000 UTC))" 2026-03-18T13:10:33.701653795Z I0318 13:10:33.701625 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839377\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839377\" (2026-03-18 12:09:37 +0000 UTC to 2029-03-18 12:09:37 +0000 UTC (now=2026-03-18 13:10:33.701615844 +0000 UTC))" 2026-03-18T13:10:50.428560527Z I0318 13:10:50.428468 1 leaderelection.go:268] successfully acquired lease kube-system/kube-scheduler 2026-03-18T13:10:50.429200475Z I0318 13:10:50.428992 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7dcf5569b5-mtnzv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:10:50.429222195Z I0318 13:10:50.429208 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-8qhwm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:10:50.429353199Z I0318 13:10:50.429314 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-qnwtb" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:10:55.036547847Z I0318 13:10:55.036251 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-samples-operator/cluster-samples-operator-85f7577d78-jjdvw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:10:55.036607139Z I0318 13:10:55.036574 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-6cb57bb5db-nkkt6" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:10:55.039980764Z I0318 13:10:55.037251 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/cluster-storage-operator-7d87854d6-92zqc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:10:55.039980764Z I0318 13:10:55.037434 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-dnztj" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:10:55.039980764Z I0318 13:10:55.037881 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-credential-operator/cloud-credential-operator-744f9dbf77-9nw6w" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:10:55.123203973Z I0318 13:10:55.122330 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-autoscaler-operator-866dc4744-q8vxr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:10.492603041Z I0318 13:11:10.492537 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-p546b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:10.496804592Z I0318 13:11:10.495411 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-nhwvw" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:13.069849347Z I0318 13:11:13.066481 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-d7pj2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:13.240747240Z I0318 13:11:13.240681 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-459lq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:24.740295369Z I0318 13:11:24.738239 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/machine-api-operator-6fbb6cf6f9-nf22v" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:24.764415495Z I0318 13:11:24.764321 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-operator-84d549f6d5-6qlqd" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:24.774111115Z I0318 13:11:24.773275 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-insights/insights-operator-68bf6ff9d6-ckwz8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:25.309421525Z I0318 13:11:25.309310 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-machine-approver/machine-approver-5c6485487f-f8zc2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:32.296899332Z I0318 13:11:32.296838 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-daemon-2qjl7" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:35.460381620Z I0318 13:11:35.460323 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856-ncjbh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:42.303497201Z I0318 13:11:42.303189 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-controller-b4f87c5b9-qpp2s" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:43.958734966Z I0318 13:11:43.958612 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-qnwtb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:43.968811847Z I0318 13:11:43.967043 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-8qhwm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:43.968811847Z I0318 13:11:43.968097 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress/router-default-7dcf5569b5-mtnzv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:47.705462727Z I0318 13:11:47.705385 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/prometheus-operator-6c8df6d4b-6twz2" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:11:47.770477254Z I0318 13:11:47.770390 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-config-operator/machine-config-server-4f5s4" node="master-0" evaluatedNodes=1 feasibleNodes=1 config/pod/kube-system/logs/bootstrap-kube-scheduler-master-0/kube-scheduler_previous.log0000640000000000000000000006633115156522230030421 0ustar00000000000000002026-03-18T13:06:17.359166352Z I0318 13:06:17.359052 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-cwpkz" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:17.431995923Z I0318 13:06:17.431361 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5f5d689c6b-4s6b8" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:17.598813351Z I0318 13:06:17.598730 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-mqh5c" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:17.716248561Z I0318 13:06:17.715766 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-c7nh9" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:17.791597005Z I0318 13:06:17.791502 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-lwfvl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:17.934429154Z I0318 13:06:17.934226 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-56d8475767-l6hzm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:17.959161095Z I0318 13:06:17.959052 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-dns-operator/dns-operator-9c5679d8f-bqbzx" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:18.010575512Z I0318 13:06:18.010020 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-4qs2l" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:18.172059974Z I0318 13:06:18.171440 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-image-registry/cluster-image-registry-operator-5549dc66cb-n995f" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:18.233675369Z I0318 13:06:18.233572 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-hmbpl" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:18.380996118Z I0318 13:06:18.380883 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-nqtlk" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:18.500633072Z I0318 13:06:18.500573 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-5zbrg" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:18.650034123Z I0318 13:06:18.649984 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress-operator/ingress-operator-66b84d69b-xwqsb" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:18.726714916Z I0318 13:06:18.726610 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-4bfbf" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:20.251408765Z I0318 13:06:20.251320 1 schedule_one.go:314] "Successfully bound pod to node" pod="assisted-installer/assisted-installer-controller-m2vzq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:32.995152331Z I0318 13:06:32.995066 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/mtu-prober-9f9ht" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:43.946103080Z I0318 13:06:43.945978 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-9bhww" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:44.303406815Z I0318 13:06:44.303315 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-additional-cni-plugins-xpppb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:44.903316825Z I0318 13:06:44.903237 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/network-metrics-daemon-kq2j4" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:46.250504165Z I0318 13:06:46.250408 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-zvsmb" err="0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:58.829487040Z I0318 13:06:58.829086 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-control-plane-57f769d897-9mk42" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:58.857465024Z I0318 13:06:58.856181 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-c5rpz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:06:59.151474987Z I0318 13:06:59.151393 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-network-diagnostics/network-check-source-b4bf74f6-qnwtb" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:06:59.814257485Z I0318 13:06:59.814195 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-diagnostics/network-check-target-zlgkc" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:02.308626397Z I0318 13:07:02.308539 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-node-identity/network-node-identity-xcbtb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:32.077620457Z I0318 13:07:32.077554 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ovn-kubernetes/ovnkube-node-pfs29" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.802393000Z I0318 13:07:48.802234 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca-operator/service-ca-operator-b865698dc-7t5g5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.957048018Z I0318 13:07:48.956979 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/cluster-node-tuning-operator-598fbc5f8f-p6tvz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.957163481Z I0318 13:07:48.957128 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/marketplace-operator-89ccd998f-4v84b" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.957228663Z I0318 13:07:48.957187 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator-operator/kube-storage-version-migrator-operator-6bb5bfb6fd-5qndf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.959407425Z I0318 13:07:48.959366 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-image-registry/cluster-image-registry-operator-5549dc66cb-n995f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.959437536Z I0318 13:07:48.959372 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns-operator/dns-operator-9c5679d8f-bqbzx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.959502248Z I0318 13:07:48.959477 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-4bfbf" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.959550959Z I0318 13:07:48.959530 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-nqtlk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.959597461Z I0318 13:07:48.959579 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-authentication-operator/authentication-operator-5885bfd7f4-mqh5c" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.959651232Z I0318 13:07:48.959620 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/cluster-baremetal-operator-6f69995874-7w5g8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.959703594Z I0318 13:07:48.959634 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-operator-5f5d689c6b-4s6b8" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.959752055Z I0318 13:07:48.959714 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-lwfvl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.959799216Z I0318 13:07:48.959669 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-cwpkz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.960239679Z I0318 13:07:48.960214 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-multus/multus-admission-controller-5dbbb8b86f-zvsmb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.960370062Z I0318 13:07:48.960334 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-p9k56" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.960744543Z I0318 13:07:48.960721 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/olm-operator-5c9796789-8r4hr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.960918138Z I0318 13:07:48.960893 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-kbpvr" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.961155975Z I0318 13:07:48.961116 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager-operator/openshift-controller-manager-operator-8c94f4649-4qs2l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.961332370Z I0318 13:07:48.961310 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-ingress-operator/ingress-operator-66b84d69b-xwqsb" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.961622378Z I0318 13:07:48.961585 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-5zbrg" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.963116660Z I0318 13:07:48.963088 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-config-operator/openshift-config-operator-95bf4f4d-c7nh9" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.963436159Z I0318 13:07:48.963414 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-monitoring/cluster-monitoring-operator-58845fbb57-jfdn5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:48.963687747Z I0318 13:07:48.963667 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-hmbpl" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:07:49.425856921Z I0318 13:07:49.423249 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-network-operator/iptables-alerter-tvnss" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:20.223455731Z I0318 13:08:20.223398 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-service-ca/service-ca-79bc6b8d76-855bx" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:27.679989384Z I0318 13:08:27.679439 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-f5df8899c-t4hlq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:28.236777536Z I0318 13:08:28.236726 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-kube-storage-version-migrator/migrator-8487694857-vf6mv" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:28.541227046Z I0318 13:08:28.541170 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-756d974757-dktsh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:28.557654846Z I0318 13:08:28.557594 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5bbb6996c6-bbzgm" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:30.452366539Z I0318 13:08:30.452302 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-ff8b688b4-t48ff" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:35.566117348Z I0318 13:08:35.557307 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-ff8b688b4-t48ff" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:38.025006850Z I0318 13:08:38.021772 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-oauth-apiserver/apiserver-7d95bbc4f4-4ch22" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:38.692415958Z I0318 13:08:38.688757 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5484d978b-wmp2h" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:38.699757093Z I0318 13:08:38.699087 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-5cc4dcd8b-d7b47" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:39.515133192Z I0318 13:08:39.512624 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-6774666ccc-2b2qz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:39.546398587Z I0318 13:08:39.545180 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-catalogd/catalogd-controller-manager-6864dc98f7-8jrfz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:39.837682609Z I0318 13:08:39.837604 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-storage-operator/csi-snapshot-controller-64854d9cff-wkw7f" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:39.905714633Z I0318 13:08:39.905428 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-5484d978b-wmp2h" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:39.917324168Z I0318 13:08:39.916365 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-5cc4dcd8b-d7b47" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:40.277273621Z I0318 13:08:40.277209 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-controller/operator-controller-controller-manager-57777556ff-4r95z" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:42.737244554Z I0318 13:08:42.736198 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-5484d978b-wmp2h" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:43.080571382Z I0318 13:08:43.080380 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-apiserver/apiserver-574f6d5bf6-8krhk" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:45.000273915Z I0318 13:08:45.000182 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-apiserver/apiserver-574f6d5bf6-8krhk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:47.009559386Z I0318 13:08:47.008144 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-node-tuning-operator/tuned-rlp78" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:47.275290443Z I0318 13:08:47.269353 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-b977b9447-ssl9l" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:47.348425290Z I0318 13:08:47.347719 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-68f97cf79f-trbrq" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:47.565777393Z I0318 13:08:47.565324 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/dns-default-wl929" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:48.075987650Z I0318 13:08:48.075776 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-ingress/router-default-7dcf5569b5-mtnzv" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:08:48.201990416Z I0318 13:08:48.200313 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-dns/node-resolver-slqms" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:48.694883513Z I0318 13:08:48.694790 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-b977b9447-ssl9l" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:48.695345496Z I0318 13:08:48.695314 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-68f97cf79f-trbrq" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:53.123061805Z I0318 13:08:53.123004 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-b977b9447-ssl9l" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:53.123611100Z I0318 13:08:53.123584 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-68f97cf79f-trbrq" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:53.557033200Z I0318 13:08:53.556817 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-cluster-version/cluster-version-operator-7d58488df-2bmkn" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:08:57.734109226Z I0318 13:08:57.734022 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-b977b9447-ssl9l" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:08:58.400539685Z I0318 13:08:58.400487 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-68f97cf79f-trbrq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:09:03.684359281Z I0318 13:09:03.683046 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594-8qhwm" err="0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling." 2026-03-18T13:09:04.546731573Z I0318 13:09:04.546090 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/community-operators-p7499" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:09:04.783539155Z I0318 13:09:04.782322 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-marketplace-7gwnt" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:09:05.754803686Z I0318 13:09:05.750181 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-b977b9447-ssl9l" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:09:05.993429790Z I0318 13:09:05.993230 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/redhat-operators-s6vkz" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:09:05.998625265Z I0318 13:09:05.998358 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-operator-lifecycle-manager/packageserver-5dccbdd8cc-pw7vm" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:09:07.019742974Z I0318 13:09:07.019425 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-66b7876dbc-rdzrh" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:09:07.116858983Z I0318 13:09:07.116803 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-route-controller-manager/route-controller-manager-597f7b4fd-fgxxq" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:09:07.195747003Z I0318 13:09:07.195517 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-marketplace/certified-operators-srjhk" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:09:15.688908779Z I0318 13:09:15.687925 1 schedule_one.go:1055] "Unable to schedule pod; no fit; waiting" pod="openshift-controller-manager/controller-manager-66b7876dbc-rdzrh" err="0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules." 2026-03-18T13:09:16.070574878Z I0318 13:09:16.066322 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-route-controller-manager/route-controller-manager-597f7b4fd-fgxxq" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:09:17.393419266Z I0318 13:09:17.393362 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-machine-api/control-plane-machine-set-operator-6f97756bc8-bjpp5" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:09:17.756568957Z I0318 13:09:17.756476 1 schedule_one.go:314] "Successfully bound pod to node" pod="openshift-controller-manager/controller-manager-66b7876dbc-rdzrh" node="master-0" evaluatedNodes=1 feasibleNodes=1 2026-03-18T13:09:25.981328155Z E0318 13:09:25.981264 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": net/http: request canceled (Client.Timeout exceeded while awaiting headers), falling back to slow path 2026-03-18T13:09:30.981300118Z E0318 13:09:30.981221 1 leaderelection.go:436] error retrieving resource lock kube-system/kube-scheduler: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/kube-system/leases/kube-scheduler?timeout=5s": context deadline exceeded 2026-03-18T13:09:30.981300118Z I0318 13:09:30.981267 1 leaderelection.go:297] failed to renew lease kube-system/kube-scheduler: timed out waiting for the condition 2026-03-18T13:09:35.982577837Z E0318 13:09:35.982467 1 leaderelection.go:322] Failed to release lock: the server was unable to return a response in the time allotted, but may still be processing the request (put leases.coordination.k8s.io kube-scheduler) 2026-03-18T13:09:35.982577837Z E0318 13:09:35.982501 1 server.go:309] "Leaderelection lost" config/pod/kube-system/bootstrap-kube-scheduler-master-0.json0000640000000000000000000000705515156522230023005 0ustar0000000000000000{"metadata":{"name":"bootstrap-kube-scheduler-master-0","namespace":"kube-system","uid":"44d36162-9bea-4fa3-93df-647b4192794b","resourceVersion":"8262","creationTimestamp":"2026-03-18T13:07:20Z","labels":{"openshift.io/component":"scheduler","openshift.io/control-plane":"true"},"annotations":{"kubernetes.io/config.hash":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.mirror":"c83737980b9ee109184b1d78e942cf36","kubernetes.io/config.seen":"2026-03-18T13:05:42.113249483Z","kubernetes.io/config.source":"file","openshift.io/run-level":"0","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"91c86903-c481-4337-816d-5d4395974319","controller":true}]},"spec":{"volumes":[{"name":"secrets","hostPath":{"path":"/etc/kubernetes/bootstrap-secrets","type":""}},{"name":"logs","hostPath":{"path":"/var/log/bootstrap-control-plane","type":""}}],"containers":[{"name":"kube-scheduler","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["hyperkube","kube-scheduler"],"args":["--kubeconfig=/etc/kubernetes/secrets/kubeconfig","--leader-elect=true","--cert-dir=/var/run/kubernetes","--authentication-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--authorization-kubeconfig=/etc/kubernetes/secrets/kubeconfig","--v=2"],"resources":{"requests":{"cpu":"15m","memory":"50Mi"}},"volumeMounts":[{"name":"secrets","readOnly":true,"mountPath":"/etc/kubernetes/secrets"},{"name":"logs","mountPath":"/var/log/bootstrap-control-plane"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"File","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priority":0,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:11Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:11Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:09:38Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:09:38Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:11Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:08:11Z","containerStatuses":[{"name":"kube-scheduler","state":{"running":{"startedAt":"2026-03-18T13:09:37Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","startedAt":"2026-03-18T13:05:52Z","finishedAt":"2026-03-18T13:09:36Z","containerID":"cri-o://40d2f52b6191fb64bc515d1f7e32cd3a0019730cc68c0ff9674d239a2fee21db"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","containerID":"cri-o://fa1d385ac095a8d1dc31f1e6dbbfd78274773bc8abd30fc3ee99e963ef88d538","started":true}],"qosClass":"Burstable"}}kube-controller-manager-operator_current.log0000640000000000000000000001020415156522230044436 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-nqtlk2026-03-18T13:10:28.718741512Z I0318 13:10:28.718514 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:10:28.718741512Z I0318 13:10:28.718662 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:10:28.719381220Z I0318 13:10:28.719320 1 observer_polling.go:159] Starting file observer 2026-03-18T13:10:35.323461817Z I0318 13:10:35.323398 1 builder.go:304] kube-controller-manager-operator version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-18T13:10:36.045750054Z I0318 13:10:36.045670 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:10:36.045750054Z W0318 13:10:36.045741 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:10:36.045787815Z W0318 13:10:36.045752 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:10:36.045787815Z W0318 13:10:36.045757 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:10:36.045787815Z W0318 13:10:36.045761 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:10:36.045787815Z W0318 13:10:36.045764 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:10:36.045787815Z W0318 13:10:36.045766 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:10:36.048326297Z I0318 13:10:36.047910 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:10:36.048326297Z I0318 13:10:36.048285 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager-operator/kube-controller-manager-operator-lock... 2026-03-18T13:10:36.049757908Z I0318 13:10:36.049681 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:10:36.049757908Z I0318 13:10:36.049691 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:10:36.049782328Z I0318 13:10:36.049755 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:10:36.049782328Z I0318 13:10:36.049758 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:10:36.049782328Z I0318 13:10:36.049776 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:36.049820109Z I0318 13:10:36.049730 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:10:36.050592991Z I0318 13:10:36.049979 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:10:36.050592991Z I0318 13:10:36.050208 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:10:36.050592991Z I0318 13:10:36.050229 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:10:36.150982326Z I0318 13:10:36.150880 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:36.151086969Z I0318 13:10:36.151039 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:10:36.151229073Z I0318 13:10:36.151196 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file kube-controller-manager-operator_previous.log0000640000000000000000000004034215156522230044636 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator/logs/kube-controller-manager-operator-ff989d6cc-nqtlk2026-03-18T13:09:19.988186187Z I0318 13:09:19.988112 1 request.go:700] Waited for 1.396174612s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/configmaps/cluster-policy-controller-config 2026-03-18T13:09:20.590746703Z I0318 13:09:20.590433 1 installer_controller.go:550] "master-0" is in transition to 2, but has not made progress because installer is not finished, but in Pending phase 2026-03-18T13:09:21.189160202Z I0318 13:09:21.187711 1 request.go:700] Waited for 1.395820392s due to client-side throttling, not priority and fairness, request: GET:https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dopenshift-kube-apiserver 2026-03-18T13:09:37.632479146Z I0318 13:09:37.632371 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.crt" has been created (hash="05ff52f0775ce86d85b6b1420c024b9e3ed18d42b1e54bf603f54890b5967a51") 2026-03-18T13:09:37.632479146Z W0318 13:09:37.632427 1 builder.go:160] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was created 2026-03-18T13:09:37.632546128Z I0318 13:09:37.632514 1 observer_polling.go:111] Observed file "/var/run/secrets/serving-cert/tls.key" has been created (hash="aa28ba59dc3dbb74c255ff2e46c3c4e3b9961d04d40a2ac099c25d6a057a2000") 2026-03-18T13:09:37.633136105Z I0318 13:09:37.633092 1 genericapiserver.go:691] "[graceful-termination] pre-shutdown hooks completed" name="PreShutdownHooksStopped" 2026-03-18T13:09:37.633152055Z I0318 13:09:37.633132 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-18T13:09:37.633191566Z I0318 13:09:37.633161 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-18T13:09:37.634710609Z I0318 13:09:37.634667 1 base_controller.go:181] Shutting down kube-controller-manager ... 2026-03-18T13:09:37.634710609Z I0318 13:09:37.634696 1 base_controller.go:181] Shutting down TargetConfigController ... 2026-03-18T13:09:37.636066287Z I0318 13:09:37.636020 1 base_controller.go:181] Shutting down SATokenSignerController ... 2026-03-18T13:09:37.636146839Z I0318 13:09:37.636105 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-18T13:09:37.636194940Z I0318 13:09:37.636165 1 base_controller.go:181] Shutting down kube-controller-manager-operator-UnsupportedConfigOverrides ... 2026-03-18T13:09:37.636194940Z I0318 13:09:37.636167 1 base_controller.go:181] Shutting down MissingStaticPodController ... 2026-03-18T13:09:37.636194940Z I0318 13:09:37.636184 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-18T13:09:37.636209261Z I0318 13:09:37.636197 1 base_controller.go:181] Shutting down kube-controller-manager-StaticPodState ... 2026-03-18T13:09:37.636209261Z I0318 13:09:37.636204 1 base_controller.go:181] Shutting down kube-controller-manager-Node ... 2026-03-18T13:09:37.636220281Z I0318 13:09:37.636212 1 base_controller.go:181] Shutting down BackingResourceController-StaticResources ... 2026-03-18T13:09:37.636220281Z I0318 13:09:37.636214 1 base_controller.go:181] Shutting down GuardController ... 2026-03-18T13:09:37.636253542Z I0318 13:09:37.636231 1 base_controller.go:181] Shutting down KubeControllerManagerStaticResources-StaticResources ... 2026-03-18T13:09:37.636482578Z I0318 13:09:37.636424 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-18T13:09:37.636497829Z I0318 13:09:37.636473 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-18T13:09:37.636510339Z I0318 13:09:37.636499 1 base_controller.go:181] Shutting down Installer ... 2026-03-18T13:09:37.636510339Z I0318 13:09:37.636502 1 base_controller.go:181] Shutting down kube-controller-manager-InstallerState ... 2026-03-18T13:09:37.636523709Z I0318 13:09:37.636508 1 base_controller.go:123] Shutting down worker of MissingStaticPodController controller ... 2026-03-18T13:09:37.636523709Z I0318 13:09:37.636518 1 base_controller.go:181] Shutting down CertRotationController ... 2026-03-18T13:09:37.636641393Z I0318 13:09:37.636526 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-18T13:09:37.640346127Z I0318 13:09:37.640270 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-18T13:09:37.640346127Z I0318 13:09:37.640325 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-18T13:09:37.640346127Z I0318 13:09:37.636479 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-18T13:09:37.640381838Z I0318 13:09:37.640370 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:09:37.640395918Z I0318 13:09:37.640235 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-18T13:09:37.640408818Z I0318 13:09:37.640392 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:09:37.640421599Z I0318 13:09:37.640409 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-18T13:09:37.640421599Z I0318 13:09:37.640406 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-18T13:09:37.640455950Z I0318 13:09:37.640425 1 controller_manager.go:54] RevisionController controller terminated 2026-03-18T13:09:37.640455950Z I0318 13:09:37.636520 1 base_controller.go:113] All MissingStaticPodController workers have been terminated 2026-03-18T13:09:37.640455950Z I0318 13:09:37.640436 1 controller_manager.go:54] MissingStaticPodController controller terminated 2026-03-18T13:09:37.640455950Z I0318 13:09:37.640250 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-18T13:09:37.640455950Z I0318 13:09:37.640449 1 base_controller.go:113] All Installer workers have been terminated 2026-03-18T13:09:37.640473150Z I0318 13:09:37.640455 1 controller_manager.go:54] Installer controller terminated 2026-03-18T13:09:37.640473150Z I0318 13:09:37.640256 1 base_controller.go:123] Shutting down worker of WorkerLatencyProfile controller ... 2026-03-18T13:09:37.640473150Z I0318 13:09:37.640460 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-3844834031/tls.crt::/tmp/serving-cert-3844834031/tls.key" 2026-03-18T13:09:37.640552592Z I0318 13:09:37.640508 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-18T13:09:37.640568233Z I0318 13:09:37.640557 1 base_controller.go:123] Shutting down worker of GuardController controller ... 2026-03-18T13:09:37.640582003Z I0318 13:09:37.640567 1 base_controller.go:113] All GuardController workers have been terminated 2026-03-18T13:09:37.640582003Z I0318 13:09:37.640577 1 controller_manager.go:54] GuardController controller terminated 2026-03-18T13:09:37.640597474Z I0318 13:09:37.640583 1 base_controller.go:123] Shutting down worker of kube-controller-manager controller ... 2026-03-18T13:09:37.640597474Z I0318 13:09:37.640589 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-18T13:09:37.640597474Z I0318 13:09:37.640592 1 base_controller.go:113] All kube-controller-manager workers have been terminated 2026-03-18T13:09:37.640612434Z I0318 13:09:37.640599 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:09:37.640625724Z I0318 13:09:37.640609 1 base_controller.go:123] Shutting down worker of kube-controller-manager-Node controller ... 2026-03-18T13:09:37.640639325Z I0318 13:09:37.640624 1 base_controller.go:113] All kube-controller-manager-Node workers have been terminated 2026-03-18T13:09:37.640639325Z I0318 13:09:37.640630 1 controller_manager.go:54] kube-controller-manager-Node controller terminated 2026-03-18T13:09:37.640683226Z I0318 13:09:37.640660 1 base_controller.go:123] Shutting down worker of kube-controller-manager-StaticPodState controller ... 2026-03-18T13:09:37.640683226Z I0318 13:09:37.640668 1 base_controller.go:113] All kube-controller-manager-StaticPodState workers have been terminated 2026-03-18T13:09:37.640683226Z I0318 13:09:37.640673 1 controller_manager.go:54] kube-controller-manager-StaticPodState controller terminated 2026-03-18T13:09:37.640699996Z I0318 13:09:37.640683 1 base_controller.go:181] Shutting down LoggingSyncer ... 2026-03-18T13:09:37.640713477Z I0318 13:09:37.640696 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-18T13:09:37.640726947Z I0318 13:09:37.640711 1 builder.go:335] server exited 2026-03-18T13:09:37.640739928Z I0318 13:09:37.640723 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-controller-manager controller ... 2026-03-18T13:09:37.640761448Z I0318 13:09:37.640734 1 base_controller.go:123] Shutting down worker of kube-controller-manager-InstallerState controller ... 2026-03-18T13:09:37.640761448Z I0318 13:09:37.640744 1 base_controller.go:181] Shutting down GarbageCollectorWatcherController ... 2026-03-18T13:09:37.640761448Z I0318 13:09:37.640747 1 base_controller.go:113] All kube-controller-manager-InstallerState workers have been terminated 2026-03-18T13:09:37.640761448Z I0318 13:09:37.640753 1 controller_manager.go:54] kube-controller-manager-InstallerState controller terminated 2026-03-18T13:09:37.640777959Z I0318 13:09:37.640761 1 base_controller.go:123] Shutting down worker of GarbageCollectorWatcherController controller ... 2026-03-18T13:09:37.640777959Z I0318 13:09:37.640768 1 base_controller.go:113] All GarbageCollectorWatcherController workers have been terminated 2026-03-18T13:09:37.640777959Z I0318 13:09:37.640768 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:37.640792199Z I0318 13:09:37.636511 1 base_controller.go:181] Shutting down WorkerLatencyProfile ... 2026-03-18T13:09:37.640805339Z I0318 13:09:37.640791 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-18T13:09:37.640848381Z I0318 13:09:37.640819 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:37.640848381Z I0318 13:09:37.640840 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-18T13:09:37.640862311Z I0318 13:09:37.640850 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-18T13:09:37.640875621Z I0318 13:09:37.640860 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-18T13:09:37.640875621Z I0318 13:09:37.640694 1 base_controller.go:123] Shutting down worker of kube-controller-manager-operator-UnsupportedConfigOverrides controller ... 2026-03-18T13:09:37.640889372Z I0318 13:09:37.640879 1 base_controller.go:113] All kube-controller-manager-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:09:37.640959964Z I0318 13:09:37.640887 1 controller_manager.go:54] kube-controller-manager-operator-UnsupportedConfigOverrides controller terminated 2026-03-18T13:09:37.640959964Z I0318 13:09:37.636518 1 base_controller.go:181] Shutting down PruneController ... 2026-03-18T13:09:37.640959964Z I0318 13:09:37.640920 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-18T13:09:37.640959964Z I0318 13:09:37.640928 1 controller_manager.go:54] PruneController controller terminated 2026-03-18T13:09:37.641644033Z E0318 13:09:37.641568 1 base_controller.go:279] "Unhandled Error" err="SATokenSignerController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-18T13:09:37.642880347Z E0318 13:09:37.642800 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-controller-manager/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:09:37.642880347Z I0318 13:09:37.642843 1 base_controller.go:123] Shutting down worker of SATokenSignerController controller ... 2026-03-18T13:09:37.642880347Z I0318 13:09:37.642852 1 base_controller.go:113] All SATokenSignerController workers have been terminated 2026-03-18T13:09:37.645134511Z E0318 13:09:37.643493 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-18T13:09:37.645134511Z I0318 13:09:37.636520 1 base_controller.go:181] Shutting down StatusSyncer_kube-controller-manager ... 2026-03-18T13:09:37.645134511Z I0318 13:09:37.643828 1 base_controller.go:159] All StatusSyncer_kube-controller-manager post start hooks have been terminated 2026-03-18T13:09:37.645134511Z I0318 13:09:37.643833 1 base_controller.go:113] All StatusSyncer_kube-controller-manager workers have been terminated 2026-03-18T13:09:37.645134511Z I0318 13:09:37.643853 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-18T13:09:37.645134511Z I0318 13:09:37.643863 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-18T13:09:37.645134511Z I0318 13:09:37.643871 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-18T13:09:37.645134511Z I0318 13:09:37.645056 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-18T13:09:37.645134511Z I0318 13:09:37.645071 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-18T13:09:37.645702727Z E0318 13:09:37.645626 1 base_controller.go:279] "Unhandled Error" err="KubeControllerManagerStaticResources-StaticResources reconciliation failed: [\"assets/kube-controller-manager/vsphere/legacy-cloud-provider-sa.yaml\" (string): Delete \"https://172.30.0.1:443/api/v1/namespaces/kube-system/serviceaccounts/vsphere-legacy-cloud-provider\": context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/vsphere/legacy-cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-controller-manager/gce/cloud-provider-binding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeControllerManagerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:09:37.646862059Z I0318 13:09:37.646803 1 base_controller.go:123] Shutting down worker of KubeControllerManagerStaticResources-StaticResources controller ... 2026-03-18T13:09:37.646862059Z I0318 13:09:37.646825 1 base_controller.go:113] All KubeControllerManagerStaticResources-StaticResources workers have been terminated 2026-03-18T13:09:42.630162414Z I0318 13:09:42.630045 1 observer_polling.go:162] Shutting down file observer 2026-03-18T13:10:11.637552658Z E0318 13:10:11.637459 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:10:11.637552658Z W0318 13:10:11.637511 1 leaderelection.go:84] leader election lost kube-controller-manager-operator-ff989d6cc-nqtlk.json0000640000000000000000000001450415156522230033557 0ustar0000000000000000config/pod/openshift-kube-controller-manager-operator{"metadata":{"name":"kube-controller-manager-operator-ff989d6cc-nqtlk","generateName":"kube-controller-manager-operator-ff989d6cc-","namespace":"openshift-kube-controller-manager-operator","uid":"e2f2982b-2117-4c16-a4e3-f7e14c7ddc41","resourceVersion":"8377","creationTimestamp":"2026-03-18T13:06:18Z","labels":{"app":"kube-controller-manager-operator","pod-template-hash":"ff989d6cc"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.16/23\"],\"mac_address\":\"0a:58:0a:80:00:10\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.16/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.16\"\n ],\n \"mac\": \"0a:58:0a:80:00:10\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-controller-manager-operator-ff989d6cc","uid":"e60af4cf-682d-4232-a13f-51ba56907010","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-controller-manager-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-controller-manager-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-controller-manager-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458"},{"name":"CLUSTER_POLICY_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d"},{"name":"TOOLS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:67c988e079558dc6b20232ebf9a7f7276fee60c756caed584c9715e0bec77a5a"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-controller-manager-operator","serviceAccount":"kube-controller-manager-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:12Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.16","podIPs":[{"ip":"10.128.0.16"}],"startTime":"2026-03-18T13:07:49Z","containerStatuses":[{"name":"kube-controller-manager-operator","state":{"running":{"startedAt":"2026-03-18T13:10:28Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:08:16Z","finishedAt":"2026-03-18T13:10:11Z","containerID":"cri-o://73eeb12fc6c56e08bfbb513524488ba1e9f64fd246eaef82ed0bfd67ecb4ec86"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","containerID":"cri-o://40c575e7626998887d2a15472abe8dad00760b420577e45054ed5616a705862d","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}kube-controller-manager-recovery-controller_current.log0000640000000000000000000003427715156522230042054 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T13:11:03.032597641Z + timeout 3m /bin/bash -exuo pipefail -c 'while [ -n "$(ss -Htanop \( sport = 9443 \))" ]; do sleep 1; done' 2026-03-18T13:11:03.037748827Z ++ ss -Htanop '(' sport = 9443 ')' 2026-03-18T13:11:03.048976655Z + '[' -n '' ']' 2026-03-18T13:11:03.049875320Z + exec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=openshift-kube-controller-manager --listen=0.0.0.0:9443 -v=2 2026-03-18T13:11:03.101879134Z W0318 13:11:03.101702 1 cmd.go:257] Using insecure, self-signed certificates 2026-03-18T13:11:03.102095470Z I0318 13:11:03.102075 1 crypto.go:601] Generating new CA for cert-recovery-controller-signer@1773839463 cert, and key in /tmp/serving-cert-4062575004/serving-signer.crt, /tmp/serving-cert-4062575004/serving-signer.key 2026-03-18T13:11:03.625331036Z I0318 13:11:03.624240 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:11:03.625331036Z I0318 13:11:03.625159 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:11:03.625331036Z I0318 13:11:03.625170 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:11:03.626342315Z I0318 13:11:03.626268 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:03.635036231Z W0318 13:11:03.630647 1 builder.go:272] unable to get owner reference (falling back to namespace): Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/pods": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:03.635036231Z I0318 13:11:03.630783 1 builder.go:304] cert-recovery-controller version 4.18.0-202602261953.p2.g6347fc8.assembly.stream.el9-6347fc8-6347fc8179b2a04d51c99432ae612bf4df595dc0 2026-03-18T13:11:03.645243751Z W0318 13:11:03.645135 1 builder.go:364] unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:03.645394605Z I0318 13:11:03.645259 1 event.go:377] Event(v1.ObjectReference{Kind:"Namespace", Namespace:"openshift-kube-controller-manager", Name:"openshift-kube-controller-manager", UID:"", APIVersion:"v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'ControlPlaneTopology' unable to get control plane topology, using HA cluster values for leader election: Get "https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:03.645529419Z I0318 13:11:03.645470 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-controller-manager/cert-recovery-controller-lock... 2026-03-18T13:11:03.648542143Z E0318 13:11:03.648491 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189df1980f22bd36 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,LastTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T13:11:03.651578269Z E0318 13:11:03.651483 1 leaderelection.go:436] error retrieving resource lock openshift-kube-controller-manager/cert-recovery-controller-lock: Get "https://localhost:6443/apis/coordination.k8s.io/v1/namespaces/openshift-kube-controller-manager/leases/cert-recovery-controller-lock?timeout=1m47s": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:04.219660316Z E0318 13:11:04.219595 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189df1980f22bd36 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,LastTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T13:11:14.224375330Z E0318 13:11:14.224286 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189df1980f22bd36 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,LastTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T13:11:24.231692379Z E0318 13:11:24.231653 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189df1980f22bd36 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,LastTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T13:11:34.235644410Z E0318 13:11:34.235586 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189df1980f22bd36 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,LastTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" 2026-03-18T13:11:44.240070686Z E0318 13:11:44.240017 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/events\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" event="&Event{ObjectMeta:{openshift-kube-controller-manager.189df1980f22bd36 openshift-kube-controller-manager 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Namespace,Namespace:openshift-kube-controller-manager,Name:openshift-kube-controller-manager,UID:,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:ControlPlaneTopology,Message:unable to get control plane topology, using HA cluster values for leader election: Get \"https://localhost:6443/apis/config.openshift.io/v1/infrastructures/cluster\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery,Source:EventSource{Component:cert-recovery-controller,Host:,},FirstTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,LastTimestamp:2026-03-18 13:11:03.645101366 +0000 UTC m=+0.590784861,Count:1,Type:Warning,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:cert-recovery-controller,ReportingInstance:,}" kube-controller-manager-cert-syncer_current.log0000640000000000000000000003362515156522230040267 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T13:11:02.858485497Z I0318 13:11:02.857235 1 observer_polling.go:159] Starting file observer 2026-03-18T13:11:02.858485497Z I0318 13:11:02.857484 1 base_controller.go:76] Waiting for caches to sync for CertSyncController 2026-03-18T13:11:02.863499649Z W0318 13:11:02.863409 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:02.863537620Z E0318 13:11:02.863511 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:02.864074305Z W0318 13:11:02.863866 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:02.864074305Z E0318 13:11:02.863916 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:03.689107132Z W0318 13:11:03.689030 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:03.689107132Z E0318 13:11:03.689077 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:03.960237505Z W0318 13:11:03.958212 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:03.960237505Z E0318 13:11:03.958275 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:06.891982719Z W0318 13:11:06.891003 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:06.891982719Z E0318 13:11:06.891071 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:06.976007420Z W0318 13:11:06.975880 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:06.976007420Z E0318 13:11:06.975972 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:11.753432071Z W0318 13:11:11.753347 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:11.753432071Z E0318 13:11:11.753408 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:12.167862973Z W0318 13:11:12.167779 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:12.167862973Z E0318 13:11:12.167852 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:22.198461074Z W0318 13:11:22.198357 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:22.198519196Z E0318 13:11:22.198466 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:22.462162595Z W0318 13:11:22.462024 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:22.462162595Z E0318 13:11:22.462103 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:37.927621471Z W0318 13:11:37.926477 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ConfigMap: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:37.927621471Z E0318 13:11:37.926545 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/configmaps?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" 2026-03-18T13:11:42.403993691Z W0318 13:11:42.403905 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.Secret: Get "https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery 2026-03-18T13:11:42.403993691Z E0318 13:11:42.403968 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.Secret: failed to list *v1.Secret: Get \"https://localhost:6443/api/v1/namespaces/openshift-kube-controller-manager/secrets?limit=500&resourceVersion=0\": tls: failed to verify certificate: x509: certificate is valid for kubernetes, kubernetes.default, kubernetes.default.svc, kubernetes.default.svc.cluster.local, openshift, openshift.default, openshift.default.svc, openshift.default.svc.cluster.local, not localhost-recovery" cluster-policy-controller_current.log0000640000000000000000000005344315156522230036453 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T13:11:03.719446712Z I0318 13:11:03.719440 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:deployer" not found 2026-03-18T13:11:03.719477253Z I0318 13:11:03.719448 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:image-builder" not found 2026-03-18T13:11:03.720065600Z I0318 13:11:03.720037 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:03.720544973Z I0318 13:11:03.720518 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:image-puller" not found 2026-03-18T13:11:03.720602205Z I0318 13:11:03.720582 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:deployer" not found 2026-03-18T13:11:03.720612915Z I0318 13:11:03.720600 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:image-builder" not found 2026-03-18T13:11:03.720926544Z I0318 13:11:03.720900 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:image-puller" not found 2026-03-18T13:11:03.720994166Z I0318 13:11:03.720975 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:deployer" not found 2026-03-18T13:11:03.720994166Z I0318 13:11:03.720984 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:image-builder" not found 2026-03-18T13:11:03.720994166Z I0318 13:11:03.720990 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve clusterrole from role ref: clusterrole.rbac.authorization.k8s.io "system:image-puller" not found 2026-03-18T13:11:03.722397086Z E0318 13:11:03.722361 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-machine-api" should be enqueued: namespace "openshift-machine-api" not found 2026-03-18T13:11:03.722767726Z I0318 13:11:03.722562 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "monitoring-alertmanager-edit" not found 2026-03-18T13:11:03.723573479Z E0318 13:11:03.723537 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-network-node-identity" should be enqueued: namespace "openshift-network-node-identity" not found 2026-03-18T13:11:03.723697743Z E0318 13:11:03.723667 1 podsecurity_label_sync_controller.go:420] failed to determine whether namespace "openshift-service-ca" should be enqueued: namespace "openshift-service-ca" not found 2026-03-18T13:11:03.724489295Z I0318 13:11:03.724450 1 reflector.go:368] Caches populated for *v1.ReplicaSet from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:03.731477603Z I0318 13:11:03.730958 1 base_controller.go:74] Caches are synced for WebhookAuthenticatorCertApprover_csr-approver-controller 2026-03-18T13:11:03.731477603Z I0318 13:11:03.731002 1 base_controller.go:111] Starting #1 worker of WebhookAuthenticatorCertApprover_csr-approver-controller controller ... 2026-03-18T13:11:03.824688564Z I0318 13:11:03.824635 1 reflector.go:368] Caches populated for *v1.LimitRange from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:03.842447707Z I0318 13:11:03.842378 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:04.033851131Z I0318 13:11:04.033791 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:04.035911839Z I0318 13:11:04.035878 1 shared_informer.go:320] Caches are synced for privileged-namespaces-psa-label-syncer 2026-03-18T13:11:04.038263086Z I0318 13:11:04.038238 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:04.128292957Z I0318 13:11:04.127983 1 base_controller.go:74] Caches are synced for namespace-security-allocation-controller 2026-03-18T13:11:04.128292957Z I0318 13:11:04.128012 1 base_controller.go:111] Starting #1 worker of namespace-security-allocation-controller controller ... 2026-03-18T13:11:04.128292957Z I0318 13:11:04.128051 1 namespace_scc_allocation_controller.go:111] Repairing SCC UID Allocations 2026-03-18T13:11:04.235865675Z I0318 13:11:04.231235 1 reflector.go:368] Caches populated for *v1.ResourceQuota from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:04.244573062Z I0318 13:11:04.243450 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:04.426977501Z I0318 13:11:04.426485 1 reflector.go:368] Caches populated for *v1.ReplicationController from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:04.439114455Z I0318 13:11:04.439040 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:04.489738449Z W0318 13:11:04.489238 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:04.489738449Z E0318 13:11:04.489289 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:04.638120714Z I0318 13:11:04.638058 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:04.707924891Z I0318 13:11:04.707846 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:04.822946801Z I0318 13:11:04.822014 1 request.go:700] Waited for 1.192771467s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/api/v1/podtemplates?limit=500&resourceVersion=0 2026-03-18T13:11:04.824010531Z I0318 13:11:04.823985 1 reflector.go:368] Caches populated for *v1.PodTemplate from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:04.842006521Z I0318 13:11:04.838908 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:05.039036424Z I0318 13:11:05.038899 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:05.073751118Z I0318 13:11:05.073668 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:05.233819863Z I0318 13:11:05.233761 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:05.239893495Z I0318 13:11:05.238466 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:05.439515572Z I0318 13:11:05.439455 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:05.443290319Z I0318 13:11:05.443256 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:05.533411632Z I0318 13:11:05.533325 1 base_controller.go:74] Caches are synced for pod-security-admission-label-synchronization-controller 2026-03-18T13:11:05.533411632Z I0318 13:11:05.533366 1 base_controller.go:111] Starting #1 worker of pod-security-admission-label-synchronization-controller controller ... 2026-03-18T13:11:05.624626087Z I0318 13:11:05.624567 1 reflector.go:368] Caches populated for *v1.PersistentVolumeClaim from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:05.641183986Z I0318 13:11:05.641145 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:05.823467391Z I0318 13:11:05.822929 1 request.go:700] Waited for 2.192961069s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/api/v1/endpoints?limit=500&resourceVersion=0 2026-03-18T13:11:05.829269746Z I0318 13:11:05.828289 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:05.838321022Z I0318 13:11:05.838259 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:06.040030058Z I0318 13:11:06.038655 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:06.238633736Z I0318 13:11:06.238578 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:06.289044144Z I0318 13:11:06.288851 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:06.438911851Z I0318 13:11:06.438839 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:06.439689693Z I0318 13:11:06.439631 1 namespace_scc_allocation_controller.go:116] Repair complete 2026-03-18T13:11:06.639454263Z I0318 13:11:06.639393 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:06.783812634Z W0318 13:11:06.783740 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:06.783812634Z E0318 13:11:06.783801 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:06.837599768Z I0318 13:11:06.837542 1 request.go:700] Waited for 3.19951619s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/metal3.io/v1alpha1/hostfirmwaresettings?limit=500&resourceVersion=0 2026-03-18T13:11:06.839518302Z I0318 13:11:06.839498 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:07.038351466Z I0318 13:11:07.038300 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:07.238697932Z I0318 13:11:07.238631 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:07.438558345Z I0318 13:11:07.438497 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:07.640985321Z I0318 13:11:07.639089 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:07.838427226Z I0318 13:11:07.837588 1 request.go:700] Waited for 4.199395072s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/network.operator.openshift.io/v1/egressrouters?limit=500&resourceVersion=0 2026-03-18T13:11:07.839297191Z I0318 13:11:07.839257 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:08.039360520Z I0318 13:11:08.039297 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:08.247833197Z I0318 13:11:08.247762 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:08.439044584Z I0318 13:11:08.438995 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:08.639013940Z I0318 13:11:08.638953 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:08.838998377Z I0318 13:11:08.838914 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:09.038282375Z I0318 13:11:09.037835 1 request.go:700] Waited for 5.399507037s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/k8s.ovn.org/v1/egressqoses?limit=500&resourceVersion=0 2026-03-18T13:11:09.039690365Z I0318 13:11:09.039576 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:09.241353776Z I0318 13:11:09.241283 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:09.438685342Z I0318 13:11:09.438612 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:09.535757353Z I0318 13:11:09.535690 1 sccrolecache.go:466] failed to retrieve a role for a rolebinding ref: couldn't retrieve role from role ref: role.rbac.authorization.k8s.io "prometheus-k8s" not found 2026-03-18T13:11:09.638464338Z I0318 13:11:09.638392 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:09.838767869Z I0318 13:11:09.838721 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:10.040814851Z I0318 13:11:10.040714 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:10.237320543Z I0318 13:11:10.237271 1 request.go:700] Waited for 6.598815963s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/monitoring.coreos.com/v1/prometheusrules?limit=500&resourceVersion=0 2026-03-18T13:11:10.241159084Z I0318 13:11:10.241103 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:10.444093871Z I0318 13:11:10.441420 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:10.639041077Z I0318 13:11:10.638986 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:10.850516961Z I0318 13:11:10.850471 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:11.038851516Z I0318 13:11:11.038804 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:11.237679615Z I0318 13:11:11.237524 1 request.go:700] Waited for 7.598827035s due to client-side throttling, not priority and fairness, request: GET:https://api-int.sno.openstack.lab:6443/apis/monitoring.coreos.com/v1/prometheuses?limit=500&resourceVersion=0 2026-03-18T13:11:11.239391625Z I0318 13:11:11.239290 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:11.443045643Z I0318 13:11:11.442251 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:11.639154203Z I0318 13:11:11.639083 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:11.838734243Z I0318 13:11:11.838654 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:12.038648183Z I0318 13:11:12.038577 1 reflector.go:368] Caches populated for *v1.PartialObjectMetadata from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 2026-03-18T13:11:12.040837117Z I0318 13:11:12.040809 1 reconciliation_controller.go:224] synced cluster resource quota controller 2026-03-18T13:11:12.117854580Z I0318 13:11:12.117799 1 reconciliation_controller.go:149] Caches are synced 2026-03-18T13:11:13.024086726Z W0318 13:11:13.019440 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:13.024086726Z E0318 13:11:13.019496 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:22.788361690Z W0318 13:11:22.788304 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:22.788361690Z E0318 13:11:22.788350 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:41.679721517Z W0318 13:11:41.679630 1 reflector.go:561] k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io) 2026-03-18T13:11:41.679721517Z E0318 13:11:41.679683 1 reflector.go:158] "Unhandled Error" err="k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243: Failed to watch *v1.ImageStream: failed to list *v1.ImageStream: the server is currently unable to handle the request (get imagestreams.image.openshift.io)" 2026-03-18T13:11:42.049403377Z I0318 13:11:42.049273 1 reconciliation_controller.go:171] error occurred GetQuotableResources err=unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1 2026-03-18T13:11:42.049452638Z E0318 13:11:42.049420 1 reconciliation_controller.go:172] "Unhandled Error" err="unable to retrieve the complete list of server APIs: apps.openshift.io/v1: stale GroupVersion discovery: apps.openshift.io/v1, authorization.openshift.io/v1: stale GroupVersion discovery: authorization.openshift.io/v1, build.openshift.io/v1: stale GroupVersion discovery: build.openshift.io/v1, image.openshift.io/v1: stale GroupVersion discovery: image.openshift.io/v1, oauth.openshift.io/v1: stale GroupVersion discovery: oauth.openshift.io/v1, packages.operators.coreos.com/v1: stale GroupVersion discovery: packages.operators.coreos.com/v1, project.openshift.io/v1: stale GroupVersion discovery: project.openshift.io/v1, quota.openshift.io/v1: stale GroupVersion discovery: quota.openshift.io/v1, route.openshift.io/v1: stale GroupVersion discovery: route.openshift.io/v1, security.openshift.io/v1: stale GroupVersion discovery: security.openshift.io/v1, template.openshift.io/v1: stale GroupVersion discovery: template.openshift.io/v1, user.openshift.io/v1: stale GroupVersion discovery: user.openshift.io/v1" kube-controller-manager_current.log0000640000000000000000000010220615156522230036023 0ustar0000000000000000config/pod/openshift-kube-controller-manager/logs/kube-controller-manager-master-02026-03-18T13:11:28.358386607Z I0318 13:11:28.358338 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: cluster-baremetal-operator-images, uid: 48b7c2d5-0d0a-4ef0-8c0c-0a29d1226072]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}] 2026-03-18T13:11:28.358398217Z I0318 13:11:28.358378 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-admission-controller-webhook, uid: 5884dd6c-c722-4bff-957d-e275c902d47e]" virtual=false 2026-03-18T13:11:28.358452819Z I0318 13:11:28.358349 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: mao-trusted-ca, uid: c675c09d-5296-45a6-9880-ecdbe9516467]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9"}] 2026-03-18T13:11:28.358462139Z I0318 13:11:28.358448 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-ancillary-tools, uid: 6cd29041-7477-43cc-828e-7ab705afb4d6]" virtual=false 2026-03-18T13:11:28.388530277Z I0318 13:11:28.388454 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-api, name: cbo-trusted-ca, uid: ffbdafa7-34f1-4c3f-9f85-ab4c6c85990a]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9"}] 2026-03-18T13:11:28.388530277Z I0318 13:11:28.388501 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-cluster-readers, uid: 21652b7d-cb7a-43af-a9a4-7cb1170f553f]" virtual=false 2026-03-18T13:11:28.396965871Z I0318 13:11:28.396865 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: coreos-bootimages, uid: 79f2970e-9ab9-415b-9066-74f998f0055f]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}] 2026-03-18T13:11:28.396965871Z I0318 13:11:28.396930 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-group, uid: 7900e6f7-bcc0-4a41-9b0d-d7159f138aac]" virtual=false 2026-03-18T13:11:28.401337667Z I0318 13:11:28.401268 1 garbagecollector.go:587] "item doesn't have an owner, continue on next item" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-oauth-apiserver, name: revision-status-1, uid: c02c1cec-e86e-4953-bf89-dad09bc6c094]" 2026-03-18T13:11:28.401359337Z I0318 13:11:28.401322 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-transient, uid: 5be07231-081b-4d12-b24e-31f1372b74b4]" virtual=false 2026-03-18T13:11:28.425028240Z I0318 13:11:28.424908 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: kube-rbac-proxy, uid: 47130ea8-c2d5-4537-8195-6f7d73cee553]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}] 2026-03-18T13:11:28.425028240Z I0318 13:11:28.424990 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-whereabouts, uid: f7aa8b1f-1be0-421c-a2f9-5d55c8738fa8]" virtual=false 2026-03-18T13:11:28.445550983Z I0318 13:11:28.445474 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: machine-config-operator-images, uid: 0f8af8dc-0869-42bc-98e5-2f65a93f673c]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}] 2026-03-18T13:11:28.445550983Z I0318 13:11:28.445526 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: default-cni-sysctl-allowlist, uid: 14675a63-f1ad-43f5-b669-639cebc27ec0]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.445550983Z I0318 13:11:28.445535 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: network-diagnostics, uid: 178069ec-06b4-4a17-9c07-c433906d32b9]" virtual=false 2026-03-18T13:11:28.445583794Z I0318 13:11:28.445545 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: network-node-identity, uid: 344a178e-7316-481f-a3d2-7c5b875fc48e]" virtual=false 2026-03-18T13:11:28.445638625Z I0318 13:11:28.445474 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: cni-copy-resources, uid: 4819ca6b-c502-47f3-83ba-677e50af39c9]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.445647866Z I0318 13:11:28.445634 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: openshift-iptables-alerter, uid: 814c0203-bcbc-41b8-9812-d4e22aa5b148]" virtual=false 2026-03-18T13:11:28.445669426Z I0318 13:11:28.445648 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: multus-daemon-config, uid: 8ed38348-9f57-411e-b5dc-d7f62e2afa1e]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.445686837Z I0318 13:11:28.445670 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: openshift-ovn-kubernetes-control-plane-limited, uid: 3de4d315-dce9-4350-9cd3-0b75f6210272]" virtual=false 2026-03-18T13:11:28.445730858Z I0318 13:11:28.445704 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-marketplace, name: marketplace-trusted-ca, uid: 7cf5d2c8-20d8-48c2-87ef-5e5f4e4757a7]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}] 2026-03-18T13:11:28.445748368Z I0318 13:11:28.445728 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: openshift-ovn-kubernetes-node-identity-limited, uid: 2095c761-e693-4ecb-85a8-c69281fc16f8]" virtual=false 2026-03-18T13:11:28.446031427Z I0318 13:11:28.445996 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-monitoring, name: telemetry-config, uid: 5ae47a35-112b-42c9-a1cf-113916aa6bf9]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}] 2026-03-18T13:11:28.446051747Z I0318 13:11:28.446023 1 garbagecollector.go:540] "Processing item" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: openshift-ovn-kubernetes-node-kube-rbac-proxy, uid: eeba7c51-a21f-44b1-9051-3fff60cfac44]" virtual=false 2026-03-18T13:11:28.448266611Z I0318 13:11:28.448209 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-multus, name: whereabouts-flatfile-config, uid: eb22f0e1-9291-4ac0-96b0-eb8ecc0a58a8]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.451758072Z I0318 13:11:28.451695 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-machine-config-operator, name: machine-config-osimageurl, uid: ca6f4c0f-794e-4cce-81ea-56a544a3e66b]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}] 2026-03-18T13:11:28.460050651Z I0318 13:11:28.459951 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-operator, name: applied-cluster, uid: 1d9bbdac-890b-4290-bb72-9e6101e22588]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.465191710Z I0318 13:11:28.465133 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-network-operator, name: iptables-alerter-script, uid: 1e4f8a75-40f0-4859-9f11-80443d4700dd]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.472793429Z I0318 13:11:28.472701 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-config, uid: 8679222b-605d-47c4-991c-515e2b609939]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.474990623Z I0318 13:11:28.474914 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-ovn-kubernetes, name: ovnkube-script-lib, uid: 448d52fa-ae6e-4047-957a-8b34b06f2328]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.480600614Z I0318 13:11:28.480508 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[v1/ConfigMap, namespace: openshift-service-ca-operator, name: service-ca-operator-config, uid: 5b4dcc52-87e6-4346-b354-f8f809efaddb]" owner=[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}] 2026-03-18T13:11:28.482656304Z I0318 13:11:28.482576 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: metrics-daemon-sa-rolebinding, uid: 4fb87e73-2b6c-4c30-bee1-9a23602f7123]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.484904359Z I0318 13:11:28.484801 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-admission-controller-webhook, uid: 5884dd6c-c722-4bff-957d-e275c902d47e]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.489806740Z I0318 13:11:28.489727 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-ancillary-tools, uid: 6cd29041-7477-43cc-828e-7ab705afb4d6]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.517096858Z I0318 13:11:28.517011 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-cluster-readers, uid: 21652b7d-cb7a-43af-a9a4-7cb1170f553f]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.518499908Z I0318 13:11:28.518453 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-group, uid: 7900e6f7-bcc0-4a41-9b0d-d7159f138aac]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.521642119Z I0318 13:11:28.521582 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-transient, uid: 5be07231-081b-4d12-b24e-31f1372b74b4]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.525978084Z I0318 13:11:28.525892 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: multus-whereabouts, uid: f7aa8b1f-1be0-421c-a2f9-5d55c8738fa8]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.528608860Z I0318 13:11:28.528538 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: network-node-identity, uid: 344a178e-7316-481f-a3d2-7c5b875fc48e]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.533062919Z I0318 13:11:28.533018 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: network-diagnostics, uid: 178069ec-06b4-4a17-9c07-c433906d32b9]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.536267881Z I0318 13:11:28.536222 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: openshift-iptables-alerter, uid: 814c0203-bcbc-41b8-9812-d4e22aa5b148]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.538863286Z I0318 13:11:28.538814 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: openshift-ovn-kubernetes-control-plane-limited, uid: 3de4d315-dce9-4350-9cd3-0b75f6210272]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.542734708Z I0318 13:11:28.542688 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: openshift-ovn-kubernetes-node-identity-limited, uid: 2095c761-e693-4ecb-85a8-c69281fc16f8]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:28.545164808Z I0318 13:11:28.545113 1 garbagecollector.go:606] "item has at least one existing owner, will not garbage collect" logger="garbage-collector-controller" item="[rbac.authorization.k8s.io/v1/ClusterRoleBinding, namespace: , name: openshift-ovn-kubernetes-node-kube-rbac-proxy, uid: eeba7c51-a21f-44b1-9051-3fff60cfac44]" owner=[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}] 2026-03-18T13:11:32.247994142Z I0318 13:11:32.247115 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="70.432µs" 2026-03-18T13:11:32.251975716Z I0318 13:11:32.251052 1 replica_set.go:624] "Too many replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" need=0 deleting=1 2026-03-18T13:11:32.251975716Z I0318 13:11:32.251085 1 replica_set.go:251] "Found related ReplicaSets" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" relatedReplicaSets=["openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c"] 2026-03-18T13:11:32.251975716Z I0318 13:11:32.251110 1 controller_utils.go:608] "Deleting pod" logger="replicaset-controller" controller="cluster-cloud-controller-manager-operator-7559f7c68c" pod="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c-dnztj" 2026-03-18T13:11:32.282603290Z I0318 13:11:32.280821 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="63.892µs" 2026-03-18T13:11:32.293044341Z I0318 13:11:32.289160 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="38.13408ms" 2026-03-18T13:11:32.301648949Z I0318 13:11:32.301597 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="12.386397ms" 2026-03-18T13:11:32.301711471Z I0318 13:11:32.301689 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="53.761µs" 2026-03-18T13:11:35.146062928Z I0318 13:11:35.145655 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="49.292µs" 2026-03-18T13:11:35.373894154Z I0318 13:11:35.373835 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="29.020457ms" 2026-03-18T13:11:35.373964106Z I0318 13:11:35.373902 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-insights/insights-operator-68bf6ff9d6" duration="34.321µs" 2026-03-18T13:11:35.386195789Z I0318 13:11:35.386127 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="53.611µs" 2026-03-18T13:11:35.409673866Z I0318 13:11:35.409581 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7559f7c68c" duration="92.062µs" 2026-03-18T13:11:35.431683612Z I0318 13:11:35.431598 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" need=1 creating=1 2026-03-18T13:11:35.452392859Z I0318 13:11:35.452311 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator" err="Operation cannot be fulfilled on deployments.apps \"cluster-cloud-controller-manager-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T13:11:35.455008305Z I0318 13:11:35.454798 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="23.20734ms" 2026-03-18T13:11:35.480003006Z I0318 13:11:35.477905 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="23.052185ms" 2026-03-18T13:11:35.480003006Z I0318 13:11:35.477989 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="35.561µs" 2026-03-18T13:11:35.505760010Z I0318 13:11:35.505654 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="28.26µs" 2026-03-18T13:11:36.610621198Z I0318 13:11:36.610440 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="83.797969ms" 2026-03-18T13:11:36.610621198Z I0318 13:11:36.610533 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-api/machine-api-operator-6fbb6cf6f9" duration="54.982µs" 2026-03-18T13:11:37.792108610Z I0318 13:11:37.790920 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="149.836475ms" 2026-03-18T13:11:37.792108610Z I0318 13:11:37.791233 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-cloud-controller-manager-operator/cluster-cloud-controller-manager-operator-7dff898856" duration="75.892µs" 2026-03-18T13:11:42.278719685Z I0318 13:11:42.278615 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" need=1 creating=1 2026-03-18T13:11:42.315130836Z I0318 13:11:42.314489 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T13:11:42.315130836Z I0318 13:11:42.314491 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="35.917337ms" 2026-03-18T13:11:42.338461010Z I0318 13:11:42.337593 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-machine-config-operator/machine-config-controller" err="Operation cannot be fulfilled on deployments.apps \"machine-config-controller\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T13:11:42.368240519Z I0318 13:11:42.367926 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="53.362491ms" 2026-03-18T13:11:42.368240519Z I0318 13:11:42.368068 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="75.592µs" 2026-03-18T13:11:43.260779791Z I0318 13:11:43.260718 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="46.701µs" 2026-03-18T13:11:43.963549525Z I0318 13:11:43.963474 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="56.021µs" 2026-03-18T13:11:43.969535388Z I0318 13:11:43.969473 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="69.052µs" 2026-03-18T13:11:43.970449994Z I0318 13:11:43.969662 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="59.932µs" 2026-03-18T13:11:43.980899456Z I0318 13:11:43.980819 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="39.561µs" 2026-03-18T13:11:44.008066910Z I0318 13:11:44.004371 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="41.811µs" 2026-03-18T13:11:44.008066910Z I0318 13:11:44.004527 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="48.482µs" 2026-03-18T13:11:44.040743153Z I0318 13:11:44.040614 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="69.932µs" 2026-03-18T13:11:44.099416916Z I0318 13:11:44.099341 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="48.752µs" 2026-03-18T13:11:44.812157499Z I0318 13:11:44.812086 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="145.926412ms" 2026-03-18T13:11:44.813327632Z I0318 13:11:44.812537 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-machine-config-operator/machine-config-controller-b4f87c5b9" duration="56.332µs" 2026-03-18T13:11:44.883072836Z I0318 13:11:44.883000 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="96.333µs" 2026-03-18T13:11:44.883287672Z I0318 13:11:44.883222 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="40.282µs" 2026-03-18T13:11:45.581610547Z I0318 13:11:45.581526 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="53.659349ms" 2026-03-18T13:11:45.581924456Z I0318 13:11:45.581891 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-network-diagnostics/network-check-source-b4bf74f6" duration="48.101µs" 2026-03-18T13:11:47.528810149Z I0318 13:11:47.526342 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="44.081µs" 2026-03-18T13:11:47.548643181Z I0318 13:11:47.548582 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-ingress/router-default-7dcf5569b5" duration="46.061µs" 2026-03-18T13:11:47.574860948Z I0318 13:11:47.574780 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="9.956307ms" 2026-03-18T13:11:47.574910789Z I0318 13:11:47.574892 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-admission-webhook-69c6b55594" duration="54.142µs" 2026-03-18T13:11:47.677402137Z I0318 13:11:47.677306 1 replica_set.go:588] "Too few replicas" logger="replicaset-controller" replicaSet="openshift-monitoring/prometheus-operator-6c8df6d4b" need=1 creating=1 2026-03-18T13:11:47.696301133Z I0318 13:11:47.695266 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T13:11:47.702450610Z I0318 13:11:47.701524 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="24.25318ms" 2026-03-18T13:11:47.716404513Z I0318 13:11:47.716255 1 deployment_controller.go:512] "Error syncing deployment" logger="deployment-controller" deployment="openshift-monitoring/prometheus-operator" err="Operation cannot be fulfilled on deployments.apps \"prometheus-operator\": the object has been modified; please apply your changes to the latest version and try again" 2026-03-18T13:11:47.724002662Z I0318 13:11:47.723890 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="22.309904ms" 2026-03-18T13:11:47.739248102Z I0318 13:11:47.739158 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="15.016613ms" 2026-03-18T13:11:47.739304754Z I0318 13:11:47.739285 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="78.952µs" 2026-03-18T13:11:47.748052777Z I0318 13:11:47.748000 1 replica_set.go:679] "Finished syncing" logger="replicaset-controller" kind="ReplicaSet" key="openshift-monitoring/prometheus-operator-6c8df6d4b" duration="72.832µs" config/pod/openshift-kube-controller-manager/logs/installer-2-master-0/installer_current.log0000640000000000000000000011412515156522230031000 0ustar00000000000000002026-03-18T13:10:28.937530471Z (string) (len=10) "csr-signer" 2026-03-18T13:10:28.937530471Z }, 2026-03-18T13:10:28.937530471Z OptionalCertSecretNamePrefixes: ([]string) , 2026-03-18T13:10:28.937530471Z CertConfigMapNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-18T13:10:28.937530471Z (string) (len=20) "aggregator-client-ca", 2026-03-18T13:10:28.937530471Z (string) (len=9) "client-ca" 2026-03-18T13:10:28.937530471Z }, 2026-03-18T13:10:28.937530471Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T13:10:28.937530471Z (string) (len=17) "trusted-ca-bundle" 2026-03-18T13:10:28.937530471Z }, 2026-03-18T13:10:28.937530471Z CertDir: (string) (len=66) "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs", 2026-03-18T13:10:28.937530471Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T13:10:28.937530471Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T13:10:28.937530471Z Timeout: (time.Duration) 2m0s, 2026-03-18T13:10:28.937530471Z StaticPodManifestsLockFile: (string) "", 2026-03-18T13:10:28.937530471Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T13:10:28.937530471Z KubeletVersion: (string) "" 2026-03-18T13:10:28.937530471Z }) 2026-03-18T13:10:28.938345914Z I0318 13:10:28.938295 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T13:10:29.024656760Z I0318 13:10:29.024601 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T13:10:29.024692021Z I0318 13:10:29.024666 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:10:29.024692021Z I0318 13:10:29.024680 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:10:29.026874973Z I0318 13:10:29.026842 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-18T13:10:59.027521544Z I0318 13:10:59.027425 1 cmd.go:524] Getting installer pods for node master-0 2026-03-18T13:10:59.033534885Z I0318 13:10:59.032507 1 cmd.go:542] Latest installer revision for node master-0 is: 2 2026-03-18T13:10:59.033534885Z I0318 13:10:59.032530 1 cmd.go:431] Querying kubelet version for node master-0 2026-03-18T13:10:59.036624352Z I0318 13:10:59.036497 1 cmd.go:444] Got kubelet version 1.31.14 on target node master-0 2026-03-18T13:10:59.036624352Z I0318 13:10:59.036547 1 cmd.go:293] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-18T13:10:59.036785627Z I0318 13:10:59.036737 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2" ... 2026-03-18T13:10:59.036785627Z I0318 13:10:59.036755 1 cmd.go:229] Getting secrets ... 2026-03-18T13:10:59.039798862Z I0318 13:10:59.039747 1 copy.go:32] Got secret openshift-kube-controller-manager/localhost-recovery-client-token-2 2026-03-18T13:10:59.045829773Z I0318 13:10:59.044329 1 copy.go:32] Got secret openshift-kube-controller-manager/service-account-private-key-2 2026-03-18T13:10:59.045988067Z I0318 13:10:59.045964 1 copy.go:32] Got secret openshift-kube-controller-manager/serving-cert-2 2026-03-18T13:10:59.046016378Z I0318 13:10:59.045995 1 cmd.go:242] Getting config maps ... 2026-03-18T13:10:59.048438577Z I0318 13:10:59.048416 1 copy.go:60] Got configMap openshift-kube-controller-manager/cluster-policy-controller-config-2 2026-03-18T13:10:59.051757551Z I0318 13:10:59.051721 1 copy.go:60] Got configMap openshift-kube-controller-manager/config-2 2026-03-18T13:10:59.053947443Z I0318 13:10:59.053888 1 copy.go:60] Got configMap openshift-kube-controller-manager/controller-manager-kubeconfig-2 2026-03-18T13:10:59.055974960Z I0318 13:10:59.055925 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-cert-syncer-kubeconfig-2 2026-03-18T13:10:59.058532193Z I0318 13:10:59.058096 1 copy.go:60] Got configMap openshift-kube-controller-manager/kube-controller-manager-pod-2 2026-03-18T13:10:59.232580485Z I0318 13:10:59.232532 1 copy.go:60] Got configMap openshift-kube-controller-manager/recycler-config-2 2026-03-18T13:10:59.430008759Z I0318 13:10:59.429950 1 copy.go:60] Got configMap openshift-kube-controller-manager/service-ca-2 2026-03-18T13:10:59.630199272Z I0318 13:10:59.630157 1 copy.go:60] Got configMap openshift-kube-controller-manager/serviceaccount-ca-2 2026-03-18T13:10:59.832983458Z I0318 13:10:59.830248 1 copy.go:52] Failed to get config map openshift-kube-controller-manager/cloud-config-2: configmaps "cloud-config-2" not found 2026-03-18T13:10:59.832983458Z I0318 13:10:59.830280 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.830446 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/ca.crt" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.830619 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/namespace" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.830709 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/localhost-recovery-client-token/token" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.830803 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.830853 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/service-account-private-key/service-account.key" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.830968 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831031 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.crt" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831149 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/secrets/serving-cert/tls.key" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831252 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831346 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/cluster-policy-controller-config/config.yaml" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831445 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831500 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/config/config.yaml" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831598 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831663 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/controller-manager-kubeconfig/kubeconfig" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831761 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831831 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.831926 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832003 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/forceRedeploymentReason" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832098 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/pod.yaml" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832200 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/kube-controller-manager-pod/version" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832292 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832386 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/recycler-config/recycler-pod.yaml" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832483 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832560 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/service-ca/ca-bundle.crt" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832659 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832742 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/configmaps/serviceaccount-ca/ca-bundle.crt" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832847 1 cmd.go:221] Creating target resource directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs" ... 2026-03-18T13:10:59.832983458Z I0318 13:10:59.832901 1 cmd.go:229] Getting secrets ... 2026-03-18T13:11:00.030768242Z I0318 13:11:00.030696 1 copy.go:32] Got secret openshift-kube-controller-manager/csr-signer 2026-03-18T13:11:00.596131341Z I0318 13:11:00.595836 1 copy.go:32] Got secret openshift-kube-controller-manager/kube-controller-manager-client-cert-key 2026-03-18T13:11:00.596131341Z I0318 13:11:00.595884 1 cmd.go:242] Getting config maps ... 2026-03-18T13:11:00.607008729Z I0318 13:11:00.606911 1 copy.go:60] Got configMap openshift-kube-controller-manager/aggregator-client-ca 2026-03-18T13:11:00.637238086Z I0318 13:11:00.637169 1 copy.go:60] Got configMap openshift-kube-controller-manager/client-ca 2026-03-18T13:11:00.926707028Z I0318 13:11:00.926620 1 copy.go:60] Got configMap openshift-kube-controller-manager/trusted-ca-bundle 2026-03-18T13:11:00.927060408Z I0318 13:11:00.927034 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer" ... 2026-03-18T13:11:00.927335086Z I0318 13:11:00.927293 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.crt" ... 2026-03-18T13:11:00.927499821Z I0318 13:11:00.927456 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/csr-signer/tls.key" ... 2026-03-18T13:11:00.927620514Z I0318 13:11:00.927590 1 cmd.go:261] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key" ... 2026-03-18T13:11:00.927708227Z I0318 13:11:00.927669 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.key" ... 2026-03-18T13:11:00.927800319Z I0318 13:11:00.927777 1 cmd.go:639] Writing secret manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/secrets/kube-controller-manager-client-cert-key/tls.crt" ... 2026-03-18T13:11:00.927903432Z I0318 13:11:00.927880 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca" ... 2026-03-18T13:11:00.928054576Z I0318 13:11:00.928032 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/aggregator-client-ca/ca-bundle.crt" ... 2026-03-18T13:11:00.928166920Z I0318 13:11:00.928145 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca" ... 2026-03-18T13:11:00.928238392Z I0318 13:11:00.928216 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/client-ca/ca-bundle.crt" ... 2026-03-18T13:11:00.928356865Z I0318 13:11:00.928334 1 cmd.go:277] Creating directory "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle" ... 2026-03-18T13:11:00.928445458Z I0318 13:11:00.928414 1 cmd.go:629] Writing config file "/etc/kubernetes/static-pod-resources/kube-controller-manager-certs/configmaps/trusted-ca-bundle/ca-bundle.crt" ... 2026-03-18T13:11:00.929026514Z I0318 13:11:00.928997 1 cmd.go:335] Getting pod configmaps/kube-controller-manager-pod-2 -n openshift-kube-controller-manager 2026-03-18T13:11:01.124047870Z I0318 13:11:01.123985 1 cmd.go:351] Creating directory for static pod manifest "/etc/kubernetes/manifests" ... 2026-03-18T13:11:01.124087131Z I0318 13:11:01.124052 1 cmd.go:379] Writing a pod under "kube-controller-manager-pod.yaml" key 2026-03-18T13:11:01.124087131Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-mvd89 --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-18T13:11:01.129321620Z I0318 13:11:01.129262 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2/kube-controller-manager-pod.yaml" ... 2026-03-18T13:11:01.129685030Z I0318 13:11:01.129647 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-18T13:11:01.129685030Z I0318 13:11:01.129659 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/kube-controller-manager-pod.yaml" ... 2026-03-18T13:11:01.129685030Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"kube-controller-manager","namespace":"openshift-kube-controller-manager","creationTimestamp":null,"labels":{"app":"kube-controller-manager","kube-controller-manager":"true","revision":"2"},"annotations":{"kubectl.kubernetes.io/default-container":"kube-controller-manager","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-pod-2"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/kube-controller-manager-certs"}}],"containers":[{"name":"kube-controller-manager","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10257 \\))\" ]; do sleep 1; done'\n\nif [ -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /etc/kubernetes/static-pod-certs/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\n\nif [ -f /etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem ]; then\n echo \"Setting custom CA bundle for cloud provider\"\n export AWS_CA_BUNDLE=/etc/kubernetes/static-pod-resources/configmaps/cloud-config/ca-bundle.pem\nfi\n\nexec hyperkube kube-controller-manager --openshift-config=/etc/kubernetes/static-pod-resources/configmaps/config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authentication-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --authorization-kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/client-ca/ca-bundle.crt \\\n --requestheader-client-ca-file=/etc/kubernetes/static-pod-certs/configmaps/aggregator-client-ca/ca-bundle.crt -v=2 --tls-cert-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.crt --tls-private-key-file=/etc/kubernetes/static-pod-resources/secrets/serving-cert/tls.key --allocate-node-cidrs=false --cert-dir=/var/run/kubernetes --cloud-provider=external --cluster-cidr=10.128.0.0/16 --cluster-name=sno-mvd89 --cluster-signing-cert-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.crt --cluster-signing-duration=720h --cluster-signing-key-file=/etc/kubernetes/static-pod-certs/secrets/csr-signer/tls.key --controllers=* --controllers=-bootstrapsigner --controllers=-tokencleaner --controllers=-ttl --enable-dynamic-provisioning=true --feature-gates=AWSClusterHostedDNS=false --feature-gates=AWSEFSDriverVolumeMetrics=true --feature-gates=AdditionalRoutingCapabilities=false --feature-gates=AdminNetworkPolicy=true --feature-gates=AlibabaPlatform=true --feature-gates=AutomatedEtcdBackup=false --feature-gates=AzureWorkloadIdentity=true --feature-gates=BareMetalLoadBalancer=true --feature-gates=BootcNodeManagement=false --feature-gates=BuildCSIVolumes=true --feature-gates=CSIDriverSharedResource=false --feature-gates=ChunkSizeMiB=true --feature-gates=CloudDualStackNodeIPs=true --feature-gates=ClusterAPIInstall=false --feature-gates=ClusterAPIInstallIBMCloud=false --feature-gates=ClusterMonitoringConfig=false --feature-gates=ConsolePluginContentSecurityPolicy=false --feature-gates=DNSNameResolver=false --feature-gates=DisableKubeletCloudCredentialProviders=true --feature-gates=DynamicResourceAllocation=false --feature-gates=EtcdBackendQuota=false --feature-gates=EventedPLEG=false --feature-gates=Example=false --feature-gates=ExternalOIDC=false --feature-gates=ExternalOIDCWithUIDAndExtraClaimMappings=false --feature-gates=GCPClusterHostedDNS=false --feature-gates=GCPLabelsTags=true --feature-gates=GatewayAPI=false --feature-gates=HardwareSpeed=true --feature-gates=ImageStreamImportMode=false --feature-gates=IngressControllerDynamicConfigurationManager=false --feature-gates=IngressControllerLBSubnetsAWS=true --feature-gates=InsightsConfig=false --feature-gates=InsightsConfigAPI=false --feature-gates=InsightsOnDemandDataGather=false --feature-gates=InsightsRuntimeExtractor=false --feature-gates=KMSv1=true --feature-gates=MachineAPIMigration=false --feature-gates=MachineAPIOperatorDisableMachineHealthCheckController=false --feature-gates=MachineAPIProviderOpenStack=false --feature-gates=MachineConfigNodes=false --feature-gates=ManagedBootImages=true --feature-gates=ManagedBootImagesAWS=true --feature-gates=MaxUnavailableStatefulSet=false --feature-gates=MetricsCollectionProfiles=false --feature-gates=MinimumKubeletVersion=false --feature-gates=MixedCPUsAllocation=false --feature-gates=MultiArchInstallAWS=true --feature-gates=MultiArchInstallAzure=false --feature-gates=MultiArchInstallGCP=true --feature-gates=NetworkDiagnosticsConfig=true --feature-gates=NetworkLiveMigration=true --feature-gates=NetworkSegmentation=true --feature-gates=NewOLM=true --feature-gates=NodeDisruptionPolicy=true --feature-gates=NodeSwap=false --feature-gates=NutanixMultiSubnets=false --feature-gates=OVNObservability=false --feature-gates=OnClusterBuild=true --feature-gates=OpenShiftPodSecurityAdmission=false --feature-gates=PersistentIPsForVirtualization=true --feature-gates=PinnedImages=false --feature-gates=PlatformOperators=false --feature-gates=PrivateHostedZoneAWS=true --feature-gates=ProcMountType=false --feature-gates=RouteAdvertisements=false --feature-gates=RouteExternalCertificate=false --feature-gates=ServiceAccountTokenNodeBinding=false --feature-gates=SetEIPForNLBIngressController=true --feature-gates=SignatureStores=false --feature-gates=SigstoreImageVerification=false --feature-gates=StreamingCollectionEncodingToJSON=true --feature-gates=StreamingCollectionEncodingToProtobuf=true --feature-gates=TranslateStreamCloseWebsocketRequests=false --feature-gates=UpgradeStatus=false --feature-gates=UserNamespacesPodSecurityStandards=false --feature-gates=UserNamespacesSupport=false --feature-gates=VSphereControlPlaneMachineSet=true --feature-gates=VSphereDriverConfiguration=true --feature-gates=VSphereMultiNetworks=false --feature-gates=VSphereMultiVCenters=true --feature-gates=VSphereStaticIPs=true --feature-gates=ValidatingAdmissionPolicy=true --feature-gates=VolumeAttributesClass=false --feature-gates=VolumeGroupSnapshot=false --flex-volume-plugin-dir=/etc/kubernetes/kubelet-plugins/volume/exec --kube-api-burst=300 --kube-api-qps=150 --leader-elect-renew-deadline=12s --leader-elect-resource-lock=leases --leader-elect-retry-period=3s --leader-elect=true --pv-recycler-pod-template-filepath-hostpath=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --pv-recycler-pod-template-filepath-nfs=/etc/kubernetes/static-pod-resources/configmaps/recycler-config/recycler-pod.yaml --root-ca-file=/etc/kubernetes/static-pod-resources/configmaps/serviceaccount-ca/ca-bundle.crt --secure-port=10257 --service-account-private-key-file=/etc/kubernetes/static-pod-resources/secrets/service-account-private-key/service-account.key --service-cluster-ip-range=172.30.0.0/16 --use-service-account-credentials=true --tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 --tls-min-version=VersionTLS12"],"ports":[{"containerPort":10257}],"resources":{"requests":{"cpu":"60m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10257,"scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"cluster-policy-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 10357 \\))\" ]; do sleep 1; done'\n\nexec cluster-policy-controller start --config=/etc/kubernetes/static-pod-resources/configmaps/cluster-policy-controller-config/config.yaml \\\n --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/controller-manager-kubeconfig/kubeconfig \\\n --namespace=${POD_NAMESPACE} -v=2"],"ports":[{"containerPort":10357}],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"10m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"livenessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":45,"timeoutSeconds":10},"readinessProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":10},"startupProbe":{"httpGet":{"path":"healthz","port":10357,"host":"localhost","scheme":"HTTPS"},"timeoutSeconds":3},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-cert-syncer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["cluster-kube-controller-manager-operator","cert-syncer"],"args":["--kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig","--namespace=$(POD_NAMESPACE)","--destination-dir=/etc/kubernetes/static-pod-certs"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"fieldPath":"metadata.name"}}},{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"kube-controller-manager-recovery-controller","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","command":["/bin/bash","-euxo","pipefail","-c"],"args":["timeout 3m /bin/bash -exuo pipefail -c 'while [ -n \"$(ss -Htanop \\( sport = 9443 \\))\" ]; do sleep 1; done'\n\nexec cluster-kube-controller-manager-operator cert-recovery-controller --kubeconfig=/etc/kubernetes/static-pod-resources/configmaps/kube-controller-cert-syncer-kubeconfig/kubeconfig --namespace=${POD_NAMESPACE} --listen=0.0.0.0:9443 -v=2"],"env":[{"name":"POD_NAMESPACE","valueFrom":{"fieldRef":{"fieldPath":"metadata.namespace"}}}],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} config/pod/openshift-kube-apiserver/logs/installer-1-master-0/installer_current.log0000640000000000000000000002041715156522230027204 0ustar00000000000000002026-03-18T13:09:04.528012139Z I0318 13:09:04.526355 1 cmd.go:95] &{ true {false} installer true map[cert-configmaps:0xc0000d7900 cert-dir:0xc0002c0640 cert-secrets:0xc0000d7400 configmaps:0xc00045ab40 namespace:0xc00035fea0 optional-cert-configmaps:0xc0002c03c0 optional-cert-secrets:0xc0000d7e00 optional-configmaps:0xc00045b040 optional-secrets:0xc00045adc0 pod:0xc00045a500 pod-manifest-dir:0xc00045ba40 resource-dir:0xc00045b900 revision:0xc00035fd60 secrets:0xc00045a8c0 v:0xc00066e3c0] [0xc00066e3c0 0xc00035fd60 0xc00035fea0 0xc00045a500 0xc00045b900 0xc00045ba40 0xc00045ab40 0xc00045b040 0xc00045a8c0 0xc00045adc0 0xc0002c0640 0xc0000d7900 0xc0002c03c0 0xc0000d7400 0xc0000d7e00] [] map[cert-configmaps:0xc0000d7900 cert-dir:0xc0002c0640 cert-secrets:0xc0000d7400 configmaps:0xc00045ab40 help:0xc00066e780 kubeconfig:0xc00035fb80 log-flush-frequency:0xc00066e320 namespace:0xc00035fea0 optional-cert-configmaps:0xc0002c03c0 optional-cert-secrets:0xc0000d7e00 optional-configmaps:0xc00045b040 optional-secrets:0xc00045adc0 pod:0xc00045a500 pod-manifest-dir:0xc00045ba40 pod-manifests-lock-file:0xc0000d7180 resource-dir:0xc00045b900 revision:0xc00035fd60 secrets:0xc00045a8c0 timeout-duration:0xc00045bb80 v:0xc00066e3c0 vmodule:0xc00066e460] [0xc00035fb80 0xc00035fd60 0xc00035fea0 0xc00045a500 0xc00045a8c0 0xc00045ab40 0xc00045adc0 0xc00045b040 0xc00045b900 0xc00045ba40 0xc00045bb80 0xc0000d7180 0xc0000d7400 0xc0000d7900 0xc0000d7e00 0xc0002c03c0 0xc0002c0640 0xc00066e320 0xc00066e3c0 0xc00066e460 0xc00066e780] [0xc0000d7900 0xc0002c0640 0xc0000d7400 0xc00045ab40 0xc00066e780 0xc00035fb80 0xc00066e320 0xc00035fea0 0xc0002c03c0 0xc0000d7e00 0xc00045b040 0xc00045adc0 0xc00045a500 0xc00045ba40 0xc0000d7180 0xc00045b900 0xc00035fd60 0xc00045a8c0 0xc00045bb80 0xc00066e3c0 0xc00066e460] map[104:0xc00066e780 118:0xc00066e3c0] [] -1 0 0xc000177b00 true 0xae2140 []} 2026-03-18T13:09:04.528012139Z I0318 13:09:04.526644 1 cmd.go:96] (*installerpod.InstallOptions)(0xc000716820)({ 2026-03-18T13:09:04.528012139Z KubeConfig: (string) "", 2026-03-18T13:09:04.528012139Z KubeClient: (kubernetes.Interface) , 2026-03-18T13:09:04.528012139Z Revision: (string) (len=1) "1", 2026-03-18T13:09:04.528012139Z NodeName: (string) "", 2026-03-18T13:09:04.528012139Z Namespace: (string) (len=24) "openshift-kube-apiserver", 2026-03-18T13:09:04.528012139Z Clock: (clock.RealClock) { 2026-03-18T13:09:04.528012139Z }, 2026-03-18T13:09:04.528012139Z PodConfigMapNamePrefix: (string) (len=18) "kube-apiserver-pod", 2026-03-18T13:09:04.528012139Z SecretNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-18T13:09:04.528012139Z (string) (len=11) "etcd-client", 2026-03-18T13:09:04.528012139Z (string) (len=34) "localhost-recovery-serving-certkey", 2026-03-18T13:09:04.528012139Z (string) (len=31) "localhost-recovery-client-token" 2026-03-18T13:09:04.528012139Z }, 2026-03-18T13:09:04.528012139Z OptionalSecretNamePrefixes: ([]string) (len=2 cap=2) { 2026-03-18T13:09:04.528012139Z (string) (len=17) "encryption-config", 2026-03-18T13:09:04.528012139Z (string) (len=21) "webhook-authenticator" 2026-03-18T13:09:04.528012139Z }, 2026-03-18T13:09:04.528012139Z ConfigMapNamePrefixes: ([]string) (len=8 cap=8) { 2026-03-18T13:09:04.528012139Z (string) (len=18) "kube-apiserver-pod", 2026-03-18T13:09:04.528012139Z (string) (len=6) "config", 2026-03-18T13:09:04.528012139Z (string) (len=37) "kube-apiserver-cert-syncer-kubeconfig", 2026-03-18T13:09:04.528012139Z (string) (len=28) "bound-sa-token-signing-certs", 2026-03-18T13:09:04.528012139Z (string) (len=15) "etcd-serving-ca", 2026-03-18T13:09:04.528012139Z (string) (len=18) "kubelet-serving-ca", 2026-03-18T13:09:04.528012139Z (string) (len=22) "sa-token-signing-certs", 2026-03-18T13:09:04.528012139Z (string) (len=29) "kube-apiserver-audit-policies" 2026-03-18T13:09:04.528012139Z }, 2026-03-18T13:09:04.528012139Z OptionalConfigMapNamePrefixes: ([]string) (len=3 cap=4) { 2026-03-18T13:09:04.528012139Z (string) (len=14) "oauth-metadata", 2026-03-18T13:09:04.528012139Z (string) (len=12) "cloud-config", 2026-03-18T13:09:04.528012139Z (string) (len=24) "kube-apiserver-server-ca" 2026-03-18T13:09:04.528012139Z }, 2026-03-18T13:09:04.528012139Z CertSecretNames: ([]string) (len=10 cap=16) { 2026-03-18T13:09:04.528012139Z (string) (len=17) "aggregator-client", 2026-03-18T13:09:04.528012139Z (string) (len=30) "localhost-serving-cert-certkey", 2026-03-18T13:09:04.528012139Z (string) (len=31) "service-network-serving-certkey", 2026-03-18T13:09:04.528012139Z (string) (len=37) "external-loadbalancer-serving-certkey", 2026-03-18T13:09:04.528012139Z (string) (len=37) "internal-loadbalancer-serving-certkey", 2026-03-18T13:09:04.528012139Z (string) (len=33) "bound-service-account-signing-key", 2026-03-18T13:09:04.528012139Z (string) (len=40) "control-plane-node-admin-client-cert-key", 2026-03-18T13:09:04.528012139Z (string) (len=31) "check-endpoints-client-cert-key", 2026-03-18T13:09:04.528012139Z (string) (len=14) "kubelet-client", 2026-03-18T13:09:04.528012139Z (string) (len=16) "node-kubeconfigs" 2026-03-18T13:09:04.528012139Z }, 2026-03-18T13:09:04.528012139Z OptionalCertSecretNamePrefixes: ([]string) (len=11 cap=16) { 2026-03-18T13:09:04.528012139Z (string) (len=17) "user-serving-cert", 2026-03-18T13:09:04.528012139Z (string) (len=21) "user-serving-cert-000", 2026-03-18T13:09:04.528012139Z (string) (len=21) "user-serving-cert-001", 2026-03-18T13:09:04.528012139Z (string) (len=21) "user-serving-cert-002", 2026-03-18T13:09:04.528012139Z (string) (len=21) "user-serving-cert-003", 2026-03-18T13:09:04.528012139Z (string) (len=21) "user-serving-cert-004", 2026-03-18T13:09:04.528012139Z (string) (len=21) "user-serving-cert-005", 2026-03-18T13:09:04.528012139Z (string) (len=21) "user-serving-cert-006", 2026-03-18T13:09:04.528012139Z (string) (len=21) "user-serving-cert-007", 2026-03-18T13:09:04.528012139Z (string) (len=21) "user-serving-cert-008", 2026-03-18T13:09:04.528012139Z (string) (len=21) "user-serving-cert-009" 2026-03-18T13:09:04.528012139Z }, 2026-03-18T13:09:04.528012139Z CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) { 2026-03-18T13:09:04.528012139Z (string) (len=20) "aggregator-client-ca", 2026-03-18T13:09:04.528012139Z (string) (len=9) "client-ca", 2026-03-18T13:09:04.528012139Z (string) (len=29) "control-plane-node-kubeconfig", 2026-03-18T13:09:04.528012139Z (string) (len=26) "check-endpoints-kubeconfig" 2026-03-18T13:09:04.528012139Z }, 2026-03-18T13:09:04.528012139Z OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) { 2026-03-18T13:09:04.528012139Z (string) (len=17) "trusted-ca-bundle" 2026-03-18T13:09:04.528012139Z }, 2026-03-18T13:09:04.528012139Z CertDir: (string) (len=57) "/etc/kubernetes/static-pod-resources/kube-apiserver-certs", 2026-03-18T13:09:04.528012139Z ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources", 2026-03-18T13:09:04.528012139Z PodManifestDir: (string) (len=25) "/etc/kubernetes/manifests", 2026-03-18T13:09:04.528012139Z Timeout: (time.Duration) 2m0s, 2026-03-18T13:09:04.528012139Z StaticPodManifestsLockFile: (string) "", 2026-03-18T13:09:04.528012139Z PodMutationFns: ([]installerpod.PodMutationFunc) , 2026-03-18T13:09:04.528012139Z KubeletVersion: (string) "" 2026-03-18T13:09:04.528012139Z }) 2026-03-18T13:09:04.528012139Z I0318 13:09:04.527822 1 cmd.go:413] Getting controller reference for node master-0 2026-03-18T13:09:04.539708546Z I0318 13:09:04.539647 1 cmd.go:426] Waiting for installer revisions to settle for node master-0 2026-03-18T13:09:04.539755638Z I0318 13:09:04.539740 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:09:04.539763338Z I0318 13:09:04.539758 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:09:04.546006533Z I0318 13:09:04.544988 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0 2026-03-18T13:09:34.545264883Z I0318 13:09:34.545184 1 cmd.go:524] Getting installer pods for node master-0 2026-03-18T13:09:48.545852903Z F0318 13:09:48.545697 1 cmd.go:109] Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-kube-apiserver/installer-1-master-0.json0000640000000000000000000002132115156522230022664 0ustar0000000000000000{"metadata":{"name":"installer-1-master-0","namespace":"openshift-kube-apiserver","uid":"88cd8323-8857-41fe-85d4-e6064330ec71","resourceVersion":"8301","creationTimestamp":"2026-03-18T13:08:54Z","labels":{"app":"installer"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.45/23\"],\"mac_address\":\"0a:58:0a:80:00:2d\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.45/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.45\"\n ],\n \"mac\": \"0a:58:0a:80:00:2d\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"v1","kind":"ConfigMap","name":"revision-status-1","uid":"ab887adf-8909-4259-862a-772588bd9c4e"}]},"spec":{"volumes":[{"name":"kubelet-dir","hostPath":{"path":"/etc/kubernetes/","type":""}},{"name":"var-lock","hostPath":{"path":"/var/lock","type":""}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"installer","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","installer"],"args":["-v=2","--revision=1","--namespace=openshift-kube-apiserver","--pod=kube-apiserver-pod","--resource-dir=/etc/kubernetes/static-pod-resources","--pod-manifest-dir=/etc/kubernetes/manifests","--configmaps=kube-apiserver-pod","--configmaps=config","--configmaps=kube-apiserver-cert-syncer-kubeconfig","--optional-configmaps=oauth-metadata","--optional-configmaps=cloud-config","--configmaps=bound-sa-token-signing-certs","--configmaps=etcd-serving-ca","--optional-configmaps=kube-apiserver-server-ca","--configmaps=kubelet-serving-ca","--configmaps=sa-token-signing-certs","--configmaps=kube-apiserver-audit-policies","--secrets=etcd-client","--optional-secrets=encryption-config","--secrets=localhost-recovery-serving-certkey","--secrets=localhost-recovery-client-token","--optional-secrets=webhook-authenticator","--cert-dir=/etc/kubernetes/static-pod-resources/kube-apiserver-certs","--cert-configmaps=aggregator-client-ca","--cert-configmaps=client-ca","--optional-cert-configmaps=trusted-ca-bundle","--cert-configmaps=control-plane-node-kubeconfig","--cert-configmaps=check-endpoints-kubeconfig","--cert-secrets=aggregator-client","--cert-secrets=localhost-serving-cert-certkey","--cert-secrets=service-network-serving-certkey","--cert-secrets=external-loadbalancer-serving-certkey","--cert-secrets=internal-loadbalancer-serving-certkey","--cert-secrets=bound-service-account-signing-key","--cert-secrets=control-plane-node-admin-client-cert-key","--cert-secrets=check-endpoints-client-cert-key","--cert-secrets=kubelet-client","--cert-secrets=node-kubeconfigs","--optional-cert-secrets=user-serving-cert","--optional-cert-secrets=user-serving-cert-000","--optional-cert-secrets=user-serving-cert-001","--optional-cert-secrets=user-serving-cert-002","--optional-cert-secrets=user-serving-cert-003","--optional-cert-secrets=user-serving-cert-004","--optional-cert-secrets=user-serving-cert-005","--optional-cert-secrets=user-serving-cert-006","--optional-cert-secrets=user-serving-cert-007","--optional-cert-secrets=user-serving-cert-008","--optional-cert-secrets=user-serving-cert-009"],"env":[{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"limits":{"cpu":"150m","memory":"200M"},"requests":{"cpu":"150m","memory":"200M"}},"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"},{"name":"var-lock","mountPath":"/var/lock"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true,"runAsUser":0}}],"restartPolicy":"Never","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","serviceAccountName":"installer-sa","serviceAccount":"installer-sa","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":0},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Failed","conditions":[{"type":"PodReadyToStartContainers","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:09:50Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:54Z"},{"type":"Ready","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:09:49Z","reason":"PodFailed"},{"type":"ContainersReady","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:09:49Z","reason":"PodFailed"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:54Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.45","podIPs":[{"ip":"10.128.0.45"}],"startTime":"2026-03-18T13:08:54Z","containerStatuses":[{"name":"installer","state":{"terminated":{"exitCode":1,"reason":"Error","message":"ving-cert\",\n (string) (len=21) \"user-serving-cert-000\",\n (string) (len=21) \"user-serving-cert-001\",\n (string) (len=21) \"user-serving-cert-002\",\n (string) (len=21) \"user-serving-cert-003\",\n (string) (len=21) \"user-serving-cert-004\",\n (string) (len=21) \"user-serving-cert-005\",\n (string) (len=21) \"user-serving-cert-006\",\n (string) (len=21) \"user-serving-cert-007\",\n (string) (len=21) \"user-serving-cert-008\",\n (string) (len=21) \"user-serving-cert-009\"\n },\n CertConfigMapNamePrefixes: ([]string) (len=4 cap=4) {\n (string) (len=20) \"aggregator-client-ca\",\n (string) (len=9) \"client-ca\",\n (string) (len=29) \"control-plane-node-kubeconfig\",\n (string) (len=26) \"check-endpoints-kubeconfig\"\n },\n OptionalCertConfigMapNamePrefixes: ([]string) (len=1 cap=1) {\n (string) (len=17) \"trusted-ca-bundle\"\n },\n CertDir: (string) (len=57) \"/etc/kubernetes/static-pod-resources/kube-apiserver-certs\",\n ResourceDir: (string) (len=36) \"/etc/kubernetes/static-pod-resources\",\n PodManifestDir: (string) (len=25) \"/etc/kubernetes/manifests\",\n Timeout: (time.Duration) 2m0s,\n StaticPodManifestsLockFile: (string) \"\",\n PodMutationFns: ([]installerpod.PodMutationFunc) \u003cnil\u003e,\n KubeletVersion: (string) \"\"\n})\nI0318 13:09:04.527822 1 cmd.go:413] Getting controller reference for node master-0\nI0318 13:09:04.539647 1 cmd.go:426] Waiting for installer revisions to settle for node master-0\nI0318 13:09:04.539740 1 envvar.go:172] \"Feature gate default state\" feature=\"InformerResourceVersion\" enabled=false\nI0318 13:09:04.539758 1 envvar.go:172] \"Feature gate default state\" feature=\"WatchListClient\" enabled=false\nI0318 13:09:04.544988 1 cmd.go:518] Waiting additional period after revisions have settled for node master-0\nI0318 13:09:34.545184 1 cmd.go:524] Getting installer pods for node master-0\nF0318 13:09:48.545697 1 cmd.go:109] Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods?labelSelector=app%3Dinstaller\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)\n","startedAt":"2026-03-18T13:09:03Z","finishedAt":"2026-03-18T13:09:48Z","containerID":"cri-o://2930eafa2605e45a0822de041f245bf9aca0638ca211202bfcc70902ad20170b"}},"lastState":{},"ready":false,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://2930eafa2605e45a0822de041f245bf9aca0638ca211202bfcc70902ad20170b","started":false,"volumeMounts":[{"name":"kubelet-dir","mountPath":"/etc/kubernetes/"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"var-lock","mountPath":"/var/lock"}]}],"qosClass":"Guaranteed"}}kube-apiserver-insecure-readyz_current.log0000640000000000000000000000014615156522230035764 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-18T13:05:56.211212969Z I0318 13:05:56.210949 1 readyz.go:111] Listening on 0.0.0.0:6080 kube-apiserver_current.log0000640000000000000000000010463115156522230032661 0ustar0000000000000000config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-02026-03-18T13:11:41.521597283Z I0318 13:11:41.521518 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:41.528125291Z I0318 13:11:41.528070 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:41.561269228Z I0318 13:11:41.561211 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:41.561750812Z I0318 13:11:41.561717 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:41.714786019Z I0318 13:11:41.714716 1 cacher.go:1017] cacher (validatingadmissionpolicies.admissionregistration.k8s.io): 1 objects queued in incoming channel. 2026-03-18T13:11:41.714786019Z I0318 13:11:41.714750 1 cacher.go:1017] cacher (validatingadmissionpolicies.admissionregistration.k8s.io): 2 objects queued in incoming channel. 2026-03-18T13:11:41.715092627Z I0318 13:11:41.715065 1 cacher.go:1017] cacher (validatingadmissionpolicies.admissionregistration.k8s.io): 2 objects queued in incoming channel. 2026-03-18T13:11:41.717538358Z I0318 13:11:41.717484 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:41.719322670Z I0318 13:11:41.718770 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:41.719322670Z I0318 13:11:41.718930 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:41.721857273Z I0318 13:11:41.721787 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:41.779088945Z E0318 13:11:41.779032 1 remote_available_controller.go:470] "Unhandled Error" err="v1.quota.openshift.io failed with: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401" logger="UnhandledError" 2026-03-18T13:11:41.881321195Z I0318 13:11:41.881219 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:41.974539786Z I0318 13:11:41.973551 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:41.974539786Z I0318 13:11:41.974088 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.032132878Z I0318 13:11:42.032036 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.033570130Z I0318 13:11:42.033517 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.081847583Z I0318 13:11:42.081760 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.093356055Z I0318 13:11:42.093265 1 policy_source.go:224] refreshing policies 2026-03-18T13:11:42.098987138Z I0318 13:11:42.098879 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-18T13:11:42.100972695Z I0318 13:11:42.100882 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from runtime/asm_amd64.s:1695 2026-03-18T13:11:42.216511030Z I0318 13:11:42.216414 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.217184039Z I0318 13:11:42.216892 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.220650769Z I0318 13:11:42.220600 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.221164324Z I0318 13:11:42.221005 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.223091850Z I0318 13:11:42.223049 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.260891361Z I0318 13:11:42.260763 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.281772733Z I0318 13:11:42.281613 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.314778856Z I0318 13:11:42.314707 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.411687203Z I0318 13:11:42.411600 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.462812569Z I0318 13:11:42.462745 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.481434396Z I0318 13:11:42.481355 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.588208468Z I0318 13:11:42.588127 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.658473026Z I0318 13:11:42.658406 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.681424529Z I0318 13:11:42.681350 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.787982854Z I0318 13:11:42.787893 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.859218931Z I0318 13:11:42.859122 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.881502854Z I0318 13:11:42.881437 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:42.988506843Z I0318 13:11:42.988450 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.058690567Z I0318 13:11:43.058616 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.101230805Z I0318 13:11:43.081571 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.188212506Z I0318 13:11:43.188117 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.259119343Z I0318 13:11:43.259045 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.281520319Z I0318 13:11:43.281472 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.388401124Z I0318 13:11:43.388342 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.458798896Z I0318 13:11:43.458739 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.482015856Z I0318 13:11:43.481951 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.591095345Z I0318 13:11:43.588295 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.658547641Z I0318 13:11:43.658466 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.682458951Z I0318 13:11:43.682386 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.788570624Z I0318 13:11:43.788492 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.859002647Z I0318 13:11:43.858876 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.882223208Z I0318 13:11:43.882137 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:43.993029276Z I0318 13:11:43.992565 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.058281539Z I0318 13:11:44.058218 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.081708605Z I0318 13:11:44.081640 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.188490758Z I0318 13:11:44.188411 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.258905040Z I0318 13:11:44.258823 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.281528253Z I0318 13:11:44.281465 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.388696616Z I0318 13:11:44.388611 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.458769369Z I0318 13:11:44.458711 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.481360961Z I0318 13:11:44.481305 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.588484433Z I0318 13:11:44.588416 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.658783542Z I0318 13:11:44.658699 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.680883100Z I0318 13:11:44.680794 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.788478605Z I0318 13:11:44.788406 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.858599039Z I0318 13:11:44.858531 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.884531948Z I0318 13:11:44.882285 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:44.991016171Z I0318 13:11:44.990874 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.058986643Z I0318 13:11:45.058889 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.081285407Z I0318 13:11:45.081175 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.187877433Z I0318 13:11:45.187791 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.246739852Z I0318 13:11:45.246606 1 apf_controller.go:493] "Update CurrentCL" plName="exempt" seatDemandHighWatermark=7 seatDemandAvg=0.34584951412388576 seatDemandStdev=1.0296675459422147 seatDemandSmoothed=8.945992589747467 fairFrac=2.331974373907979 currentCL=7 concurrencyDenominator=7 backstop=false 2026-03-18T13:11:45.261216000Z I0318 13:11:45.261136 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.281991170Z I0318 13:11:45.281911 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.389356308Z I0318 13:11:45.389269 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.459149653Z I0318 13:11:45.459079 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.480832079Z I0318 13:11:45.480782 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.588058874Z I0318 13:11:45.587999 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.658720443Z I0318 13:11:45.658647 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.681816930Z I0318 13:11:45.681742 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.788119858Z I0318 13:11:45.788033 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.861858456Z I0318 13:11:45.861793 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.883011637Z I0318 13:11:45.882031 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:45.988648176Z I0318 13:11:45.988566 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.059768069Z I0318 13:11:46.059719 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.081607179Z I0318 13:11:46.081547 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.188534665Z I0318 13:11:46.188464 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.259207295Z I0318 13:11:46.259133 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.281078876Z I0318 13:11:46.281010 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.388037983Z I0318 13:11:46.387932 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.458737384Z I0318 13:11:46.458650 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.481446599Z I0318 13:11:46.481380 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.587824930Z I0318 13:11:46.587722 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.658630713Z I0318 13:11:46.658552 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.686071495Z I0318 13:11:46.682903 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.788422849Z I0318 13:11:46.788355 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.882079652Z I0318 13:11:46.881865 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:46.988490813Z I0318 13:11:46.988401 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] 2026-03-18T13:11:47.082118566Z I0318 13:11:47.082020 1 httplog.go:93] system:serviceaccount:openshift-insights:operator[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] is impersonating system:serviceaccount:openshift-insights:gather[system:serviceaccounts,system:serviceaccounts:openshift-insights,system:authenticated] config/pod/openshift-kube-apiserver/logs/bootstrap-kube-apiserver-master-0/setup_current.log0000640000000000000000000000007015156522230031144 0ustar00000000000000002026-03-18T13:05:52.851914494Z Fixing audit permissions.kube-apiserver-operator_current.log0000640000000000000000000001015115156522230037072 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-5zbrg2026-03-18T13:10:28.626805707Z I0318 13:10:28.626675 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:10:28.626805707Z I0318 13:10:28.626781 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:10:28.627689252Z I0318 13:10:28.627216 1 observer_polling.go:159] Starting file observer 2026-03-18T13:10:35.323333604Z I0318 13:10:35.323252 1 builder.go:304] kube-apiserver-operator version 4.18.0-202602261953.p2.ge9bc909.assembly.stream.el9-e9bc909-e9bc90906c726823f154c78d3e568c98ff77b6a5 2026-03-18T13:10:35.969859874Z I0318 13:10:35.969268 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:10:35.969859874Z W0318 13:10:35.969298 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:10:35.969859874Z W0318 13:10:35.969304 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:10:35.969859874Z W0318 13:10:35.969309 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:10:35.969859874Z W0318 13:10:35.969313 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:10:35.969859874Z W0318 13:10:35.969316 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:10:35.969859874Z W0318 13:10:35.969320 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:10:35.971632014Z I0318 13:10:35.971574 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:10:35.973974920Z I0318 13:10:35.973900 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:10:35.974210687Z I0318 13:10:35.974071 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:10:35.974611978Z I0318 13:10:35.974099 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:10:35.974642199Z I0318 13:10:35.974625 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:10:35.974666610Z I0318 13:10:35.974127 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:10:35.974674060Z I0318 13:10:35.974663 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:35.974681350Z I0318 13:10:35.974144 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:10:35.974688130Z I0318 13:10:35.974680 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:10:35.974710591Z I0318 13:10:35.974159 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:10:35.975082922Z I0318 13:10:35.974276 1 leaderelection.go:254] attempting to acquire leader lease openshift-kube-apiserver-operator/kube-apiserver-operator-lock... 2026-03-18T13:10:36.075487367Z I0318 13:10:36.075414 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:10:36.075694062Z I0318 13:10:36.075651 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:10:36.075754474Z I0318 13:10:36.075632 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file kube-apiserver-operator_previous.log0000640000000000000000000004323415156522230037274 0ustar0000000000000000config/pod/openshift-kube-apiserver-operator/logs/kube-apiserver-operator-8b68b9d9b-5zbrg2026-03-18T13:09:28.241388452Z I0318 13:09:28.241350 1 base_controller.go:113] All WorkerLatencyProfile workers have been terminated 2026-03-18T13:09:28.241388452Z I0318 13:09:28.241384 1 base_controller.go:181] Shutting down CertRotationTimeUpgradeableController ... 2026-03-18T13:09:28.241396212Z I0318 13:09:28.241371 1 base_controller.go:113] All highCPUUsageAlertController workers have been terminated 2026-03-18T13:09:28.241404062Z I0318 13:09:28.241329 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.241404062Z I0318 13:09:28.241396 1 base_controller.go:181] Shutting down NodeKubeconfigController ... 2026-03-18T13:09:28.241404062Z I0318 13:09:28.241357 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-18T13:09:28.241435103Z I0318 13:09:28.241409 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:09:28.241435103Z I0318 13:09:28.241427 1 base_controller.go:181] Shutting down EventWatchController ... 2026-03-18T13:09:28.241443133Z I0318 13:09:28.241437 1 base_controller.go:123] Shutting down worker of SCCReconcileController controller ... 2026-03-18T13:09:28.241450704Z I0318 13:09:28.241444 1 base_controller.go:113] All SCCReconcileController workers have been terminated 2026-03-18T13:09:28.241459774Z I0318 13:09:28.241453 1 base_controller.go:123] Shutting down worker of StatusSyncer_kube-apiserver controller ... 2026-03-18T13:09:28.241467244Z I0318 13:09:28.241459 1 base_controller.go:113] All StatusSyncer_kube-apiserver workers have been terminated 2026-03-18T13:09:28.241474604Z I0318 13:09:28.241469 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-18T13:09:28.241481814Z I0318 13:09:28.241475 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-18T13:09:28.241489025Z I0318 13:09:28.241480 1 controller_manager.go:54] LoggingSyncer controller terminated 2026-03-18T13:09:28.241496265Z I0318 13:09:28.241489 1 base_controller.go:123] Shutting down worker of cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller ... 2026-03-18T13:09:28.241503945Z I0318 13:09:28.241492 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-18T13:09:28.241503945Z I0318 13:09:28.241499 1 base_controller.go:123] Shutting down worker of kube-apiserver-RemoveStaleConditions controller ... 2026-03-18T13:09:28.241511465Z I0318 13:09:28.241505 1 base_controller.go:113] All kube-apiserver-RemoveStaleConditions workers have been terminated 2026-03-18T13:09:28.241520906Z I0318 13:09:28.241516 1 base_controller.go:123] Shutting down worker of CertRotationTimeUpgradeableController controller ... 2026-03-18T13:09:28.241528156Z I0318 13:09:28.241521 1 base_controller.go:113] All CertRotationTimeUpgradeableController workers have been terminated 2026-03-18T13:09:28.241539966Z I0318 13:09:28.241304 1 certrotationcontroller.go:828] Shutting down CertRotation 2026-03-18T13:09:28.241539966Z I0318 13:09:28.241250 1 base_controller.go:159] All CertRotationController post start hooks have been terminated 2026-03-18T13:09:28.241539966Z I0318 13:09:28.241358 1 base_controller.go:181] Shutting down cluster-kube-apiserver-operator-UnsupportedConfigOverrides ... 2026-03-18T13:09:28.241549566Z I0318 13:09:28.241539 1 base_controller.go:113] All cluster-kube-apiserver-operator-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:09:28.241549566Z I0318 13:09:28.241545 1 controller_manager.go:54] cluster-kube-apiserver-operator-UnsupportedConfigOverrides controller terminated 2026-03-18T13:09:28.241557087Z I0318 13:09:28.241388 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-18T13:09:28.241564727Z I0318 13:09:28.241559 1 base_controller.go:123] Shutting down worker of EventWatchController controller ... 2026-03-18T13:09:28.241572397Z I0318 13:09:28.241565 1 base_controller.go:113] All EventWatchController workers have been terminated 2026-03-18T13:09:28.241572397Z I0318 13:09:28.241276 1 base_controller.go:181] Shutting down RevisionController ... 2026-03-18T13:09:28.241580147Z I0318 13:09:28.241573 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-18T13:09:28.241587397Z I0318 13:09:28.241578 1 controller_manager.go:54] RevisionController controller terminated 2026-03-18T13:09:28.241587397Z I0318 13:09:28.241579 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-18T13:09:28.241622538Z I0318 13:09:28.241596 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-18T13:09:28.241622538Z I0318 13:09:28.241608 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-18T13:09:28.241622538Z I0318 13:09:28.241617 1 builder.go:335] server exited 2026-03-18T13:09:28.241631179Z I0318 13:09:28.241596 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-18T13:09:28.241631179Z I0318 13:09:28.241301 1 base_controller.go:123] Shutting down worker of PruneController controller ... 2026-03-18T13:09:28.241638729Z I0318 13:09:28.241630 1 base_controller.go:113] All PruneController workers have been terminated 2026-03-18T13:09:28.241646369Z I0318 13:09:28.241638 1 controller_manager.go:54] PruneController controller terminated 2026-03-18T13:09:28.241646369Z I0318 13:09:28.241628 1 base_controller.go:123] Shutting down worker of webhookSupportabilityController controller ... 2026-03-18T13:09:28.241675730Z I0318 13:09:28.241653 1 base_controller.go:113] All webhookSupportabilityController workers have been terminated 2026-03-18T13:09:28.241709641Z I0318 13:09:28.241688 1 base_controller.go:181] Shutting down PodSecurityReadinessController ... 2026-03-18T13:09:28.249424717Z I0318 13:09:28.249346 1 base_controller.go:123] Shutting down worker of PodSecurityReadinessController controller ... 2026-03-18T13:09:28.249424717Z I0318 13:09:28.249373 1 base_controller.go:113] All PodSecurityReadinessController workers have been terminated 2026-03-18T13:09:28.249697085Z I0318 13:09:28.249659 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:28.249697085Z I0318 13:09:28.249674 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.249697085Z I0318 13:09:28.249689 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-1664924156/tls.crt::/tmp/serving-cert-1664924156/tls.key" 2026-03-18T13:09:28.249723625Z I0318 13:09:28.249707 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:28.249723625Z I0318 13:09:28.249714 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.249735056Z I0318 13:09:28.249723 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:28.249735056Z I0318 13:09:28.249731 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.249772737Z I0318 13:09:28.249747 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:28.249772737Z I0318 13:09:28.249759 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.249772737Z I0318 13:09:28.249768 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:28.249810618Z I0318 13:09:28.249776 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.249820998Z I0318 13:09:28.249809 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:28.249820998Z I0318 13:09:28.249816 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.252564515Z E0318 13:09:28.252486 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-18T13:09:28.252697479Z W0318 13:09:28.252660 1 base_controller.go:242] Updating status of "NodeKubeconfigController" failed: unable to ApplyStatus for operator using fieldManager "NodeKubeconfigController-reportDegraded": client rate limiter Wait returned an error: context canceled 2026-03-18T13:09:28.252697479Z I0318 13:09:28.252666 1 base_controller.go:123] Shutting down worker of BoundSATokenSignerController controller ... 2026-03-18T13:09:28.252708079Z E0318 13:09:28.252694 1 base_controller.go:279] "Unhandled Error" err="NodeKubeconfigController reconciliation failed: \"secret/node-kubeconfigs\": Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/secrets/node-kubeconfigs\": context canceled" 2026-03-18T13:09:28.252708079Z I0318 13:09:28.252697 1 base_controller.go:113] All BoundSATokenSignerController workers have been terminated 2026-03-18T13:09:28.252737840Z I0318 13:09:28.252713 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:28.252737840Z I0318 13:09:28.252726 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.252747030Z I0318 13:09:28.252735 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:28.252747030Z I0318 13:09:28.252743 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.252778721Z I0318 13:09:28.252752 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:28.252778721Z I0318 13:09:28.252771 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.252788261Z I0318 13:09:28.252782 1 base_controller.go:123] Shutting down worker of CertRotationController controller ... 2026-03-18T13:09:28.252801582Z I0318 13:09:28.252788 1 base_controller.go:113] All CertRotationController workers have been terminated 2026-03-18T13:09:28.253106670Z I0318 13:09:28.253060 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:09:28.253157582Z I0318 13:09:28.253127 1 simple_featuregate_reader.go:177] Shutting down feature-gate-detector 2026-03-18T13:09:28.253265635Z I0318 13:09:28.253201 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:09:28.253265635Z I0318 13:09:28.253236 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-18T13:09:28.253537332Z I0318 13:09:28.253467 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-kube-apiserver-operator", Name:"kube-apiserver-operator", UID:"6b8b2daf-f468-4580-bb0c-f9e4c21d6034", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'InstallerPodFailed' Failed to create installer pod for revision 1 count 0 on node "master-0": Get "https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/pods/installer-1-master-0": context canceled 2026-03-18T13:09:28.254097358Z I0318 13:09:28.254047 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-18T13:09:28.254097358Z I0318 13:09:28.254074 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-18T13:09:28.254097358Z I0318 13:09:28.254092 1 base_controller.go:123] Shutting down worker of NodeKubeconfigController controller ... 2026-03-18T13:09:28.254117358Z I0318 13:09:28.254101 1 base_controller.go:113] All NodeKubeconfigController workers have been terminated 2026-03-18T13:09:28.256316620Z W0318 13:09:28.256260 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerDegraded"].reason is missing; this will eventually be fatal 2026-03-18T13:09:28.256316620Z W0318 13:09:28.256282 1 dynamic_operator_client.go:355] .status.conditions["NodeInstallerDegraded"].message is missing; this will eventually be fatal 2026-03-18T13:09:28.256316620Z W0318 13:09:28.256288 1 dynamic_operator_client.go:352] .status.conditions["NodeInstallerProgressing"].reason is missing; this will eventually be fatal 2026-03-18T13:09:28.256496985Z E0318 13:09:28.256452 1 base_controller.go:279] "Unhandled Error" err="Installer reconciliation failed: unable to ApplyStatus for operator using fieldManager \"kube-apiserver-Installer\": client rate limiter Wait returned an error: context canceled" 2026-03-18T13:09:28.258293525Z I0318 13:09:28.258038 1 base_controller.go:123] Shutting down worker of Installer controller ... 2026-03-18T13:09:28.258293525Z I0318 13:09:28.258074 1 base_controller.go:113] All Installer workers have been terminated 2026-03-18T13:09:28.258293525Z I0318 13:09:28.258087 1 controller_manager.go:54] Installer controller terminated 2026-03-18T13:09:28.258293525Z E0318 13:09:28.258195 1 base_controller.go:279] "Unhandled Error" err="BackingResourceController-StaticResources reconciliation failed: [\"manifests/installer-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/installer-sa\": context canceled, \"manifests/installer-cluster-rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"BackingResourceController-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:09:28.259395736Z I0318 13:09:28.259306 1 base_controller.go:123] Shutting down worker of BackingResourceController-StaticResources controller ... 2026-03-18T13:09:28.259501279Z I0318 13:09:28.259441 1 base_controller.go:113] All BackingResourceController-StaticResources workers have been terminated 2026-03-18T13:09:28.259501279Z I0318 13:09:28.259455 1 controller_manager.go:54] BackingResourceController-StaticResources controller terminated 2026-03-18T13:09:28.261035922Z E0318 13:09:28.260612 1 base_controller.go:279] "Unhandled Error" err="TargetConfigController reconciliation failed: client rate limiter Wait returned an error: context canceled" 2026-03-18T13:09:28.261767703Z I0318 13:09:28.261704 1 base_controller.go:123] Shutting down worker of TargetConfigController controller ... 2026-03-18T13:09:28.261767703Z I0318 13:09:28.261724 1 base_controller.go:113] All TargetConfigController workers have been terminated 2026-03-18T13:09:28.266792353Z E0318 13:09:28.266731 1 base_controller.go:279] "Unhandled Error" err="KubeAPIServerStaticResources-StaticResources reconciliation failed: [\"assets/kube-apiserver/localhost-recovery-sa.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-kube-apiserver/serviceaccounts/localhost-recovery-client\": context canceled, \"assets/kube-apiserver/apiserver.openshift.io_apirequestcount.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-flowschema-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/kube-apiserver/storage-version-migration-prioritylevelconfiguration-v1beta3.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/api-usage.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/audit-errors.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-requests.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-basic.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/podsecurity-violations.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"assets/alerts/kube-apiserver-slos-extended.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"KubeAPIServerStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:09:28.268040738Z I0318 13:09:28.267979 1 base_controller.go:123] Shutting down worker of KubeAPIServerStaticResources-StaticResources controller ... 2026-03-18T13:09:28.268040738Z I0318 13:09:28.268014 1 base_controller.go:113] All KubeAPIServerStaticResources-StaticResources workers have been terminated 2026-03-18T13:09:33.237674062Z I0318 13:09:33.237573 1 observer_polling.go:162] Shutting down file observer 2026-03-18T13:10:02.240042953Z E0318 13:10:02.239973 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:10:02.240042953Z W0318 13:10:02.240006 1 leaderelection.go:84] leader election lost config/pod/openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-5zbrg.json0000640000000000000000000001362415156522230030066 0ustar0000000000000000{"metadata":{"name":"kube-apiserver-operator-8b68b9d9b-5zbrg","generateName":"kube-apiserver-operator-8b68b9d9b-","namespace":"openshift-kube-apiserver-operator","uid":"c2c4572e-0b38-4db1-96e5-6a35e29048e7","resourceVersion":"8384","creationTimestamp":"2026-03-18T13:06:18Z","labels":{"app":"kube-apiserver-operator","pod-template-hash":"8b68b9d9b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.17/23\"],\"mac_address\":\"0a:58:0a:80:00:11\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.17/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.17\"\n ],\n \"mac\": \"0a:58:0a:80:00:11\",\n \"default\": true,\n \"dns\": {}\n}]"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"kube-apiserver-operator-8b68b9d9b","uid":"a87af6b7-14bf-42c5-b2aa-55336a1e73a0","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"serving-cert","secret":{"secretName":"kube-apiserver-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"config","configMap":{"name":"kube-apiserver-operator-config","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"kube-apiserver-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","command":["cluster-kube-apiserver-operator","operator"],"args":["--config=/var/run/configmaps/config/config.yaml"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9"},{"name":"OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65"},{"name":"OPERAND_IMAGE_VERSION","value":"1.31.14"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"kube-apiserver-operator","serviceAccount":"kube-apiserver-operator","automountServiceAccountToken":false,"nodeName":"master-0","securityContext":{"runAsUser":65534,"runAsNonRoot":true,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node-role.kubernetes.io/control-plane","operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:58Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.17","podIPs":[{"ip":"10.128.0.17"}],"startTime":"2026-03-18T13:07:49Z","containerStatuses":[{"name":"kube-apiserver-operator","state":{"running":{"startedAt":"2026-03-18T13:10:28Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:07:57Z","finishedAt":"2026-03-18T13:10:02Z","containerID":"cri-o://d02c6c3cdba1a1883c0637cac9a306051c4ef216e0033461edc5cc690bbb087e"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","containerID":"cri-o://d96c2656b3be9b7ce731b99cc6e6159cd56ae4448050073934a71abeecbf6860","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-etcd/logs/installer-1-master-0/installer_current.log0000640000000000000000000007432015156522230025201 0ustar00000000000000002026-03-18T13:09:20.810977100Z cluster-etcd-operator rev \ 2026-03-18T13:09:20.810977100Z --endpoints=$(ALL_ETCD_ENDPOINTS) \ 2026-03-18T13:09:20.810977100Z --client-cert-file=$(ETCDCTL_CERT) \ 2026-03-18T13:09:20.810977100Z --client-key-file=$(ETCDCTL_KEY) \ 2026-03-18T13:09:20.810977100Z --client-cacert-file=$(ETCDCTL_CACERT) 2026-03-18T13:09:20.810977100Z securityContext: 2026-03-18T13:09:20.810977100Z privileged: true 2026-03-18T13:09:20.810977100Z resources: 2026-03-18T13:09:20.810977100Z requests: 2026-03-18T13:09:20.810977100Z memory: 50Mi 2026-03-18T13:09:20.810977100Z cpu: 10m 2026-03-18T13:09:20.810977100Z env: 2026-03-18T13:09:20.810977100Z - name: "ALL_ETCD_ENDPOINTS" 2026-03-18T13:09:20.810977100Z value: "https://192.168.32.10:2379" 2026-03-18T13:09:20.810977100Z - name: "ETCDCTL_API" 2026-03-18T13:09:20.810977100Z value: "3" 2026-03-18T13:09:20.810977100Z - name: "ETCDCTL_CACERT" 2026-03-18T13:09:20.810977100Z value: "/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt" 2026-03-18T13:09:20.810977100Z - name: "ETCDCTL_CERT" 2026-03-18T13:09:20.810977100Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt" 2026-03-18T13:09:20.810977100Z - name: "ETCDCTL_ENDPOINTS" 2026-03-18T13:09:20.810977100Z value: "https://192.168.32.10:2379" 2026-03-18T13:09:20.810977100Z - name: "ETCDCTL_KEY" 2026-03-18T13:09:20.810977100Z value: "/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key" 2026-03-18T13:09:20.810977100Z - name: "ETCD_CIPHER_SUITES" 2026-03-18T13:09:20.810977100Z value: "TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256" 2026-03-18T13:09:20.810977100Z - name: "ETCD_DATA_DIR" 2026-03-18T13:09:20.810977100Z value: "/var/lib/etcd" 2026-03-18T13:09:20.810977100Z - name: "ETCD_ELECTION_TIMEOUT" 2026-03-18T13:09:20.810977100Z value: "2500" 2026-03-18T13:09:20.810977100Z - name: "ETCD_ENABLE_PPROF" 2026-03-18T13:09:20.810977100Z value: "true" 2026-03-18T13:09:20.810977100Z - name: "ETCD_EXPERIMENTAL_MAX_LEARNERS" 2026-03-18T13:09:20.810977100Z value: "1" 2026-03-18T13:09:20.810977100Z - name: "ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION" 2026-03-18T13:09:20.811075613Z value: "200ms" 2026-03-18T13:09:20.811075613Z - name: "ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL" 2026-03-18T13:09:20.811075613Z value: "5s" 2026-03-18T13:09:20.811075613Z - name: "ETCD_HEARTBEAT_INTERVAL" 2026-03-18T13:09:20.811075613Z value: "500" 2026-03-18T13:09:20.811075613Z - name: "ETCD_IMAGE" 2026-03-18T13:09:20.811075613Z value: "quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278" 2026-03-18T13:09:20.811075613Z - name: "ETCD_INITIAL_CLUSTER_STATE" 2026-03-18T13:09:20.811075613Z value: "existing" 2026-03-18T13:09:20.811075613Z - name: "ETCD_QUOTA_BACKEND_BYTES" 2026-03-18T13:09:20.811075613Z value: "8589934592" 2026-03-18T13:09:20.811075613Z - name: "ETCD_SOCKET_REUSE_ADDRESS" 2026-03-18T13:09:20.811075613Z value: "true" 2026-03-18T13:09:20.811075613Z - name: "ETCD_TLS_MIN_VERSION" 2026-03-18T13:09:20.811075613Z value: "TLS1.2" 2026-03-18T13:09:20.811075613Z - name: "NODE_master_0_ETCD_NAME" 2026-03-18T13:09:20.811075613Z value: "master-0" 2026-03-18T13:09:20.811075613Z - name: "NODE_master_0_ETCD_URL_HOST" 2026-03-18T13:09:20.811075613Z value: "192.168.32.10" 2026-03-18T13:09:20.811075613Z - name: "NODE_master_0_IP" 2026-03-18T13:09:20.811075613Z value: "192.168.32.10" 2026-03-18T13:09:20.811075613Z volumeMounts: 2026-03-18T13:09:20.811075613Z - mountPath: /var/lib/etcd 2026-03-18T13:09:20.811075613Z name: data-dir 2026-03-18T13:09:20.811075613Z - mountPath: /etc/kubernetes/static-pod-certs 2026-03-18T13:09:20.811075613Z name: cert-dir 2026-03-18T13:09:20.811075613Z hostNetwork: true 2026-03-18T13:09:20.811075613Z priority: 2000001000 2026-03-18T13:09:20.811075613Z priorityClassName: system-node-critical 2026-03-18T13:09:20.811075613Z tolerations: 2026-03-18T13:09:20.811075613Z - operator: "Exists" 2026-03-18T13:09:20.811075613Z volumes: 2026-03-18T13:09:20.811075613Z - hostPath: 2026-03-18T13:09:20.811075613Z path: /etc/kubernetes/manifests 2026-03-18T13:09:20.811075613Z name: static-pod-dir 2026-03-18T13:09:20.811075613Z - hostPath: 2026-03-18T13:09:20.811075613Z path: /etc/kubernetes/static-pod-resources/etcd-pod-1 2026-03-18T13:09:20.811075613Z name: resource-dir 2026-03-18T13:09:20.811075613Z - hostPath: 2026-03-18T13:09:20.811075613Z path: /etc/kubernetes/static-pod-resources/etcd-certs 2026-03-18T13:09:20.811075613Z name: cert-dir 2026-03-18T13:09:20.811075613Z - hostPath: 2026-03-18T13:09:20.811075613Z path: /var/lib/etcd 2026-03-18T13:09:20.811075613Z type: "" 2026-03-18T13:09:20.811075613Z name: data-dir 2026-03-18T13:09:20.811075613Z - hostPath: 2026-03-18T13:09:20.811075613Z path: /usr/local/bin 2026-03-18T13:09:20.811075613Z name: usr-local-bin 2026-03-18T13:09:20.811075613Z - hostPath: 2026-03-18T13:09:20.811075613Z path: /var/log/etcd 2026-03-18T13:09:20.811075613Z name: log-dir 2026-03-18T13:09:20.811075613Z - hostPath: 2026-03-18T13:09:20.811075613Z path: /etc/kubernetes 2026-03-18T13:09:20.811075613Z name: config-dir 2026-03-18T13:09:20.811075613Z - hostPath: 2026-03-18T13:09:20.811075613Z path: /var/lib/etcd-auto-backup 2026-03-18T13:09:20.811075613Z name: etcd-auto-backup-dir 2026-03-18T13:09:20.819180660Z I0318 13:09:20.819142 1 cmd.go:610] Writing pod manifest "/etc/kubernetes/static-pod-resources/etcd-pod-1/etcd-pod.yaml" ... 2026-03-18T13:09:20.819424867Z I0318 13:09:20.819390 1 cmd.go:617] Removed existing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-18T13:09:20.819424867Z I0318 13:09:20.819404 1 cmd.go:621] Writing static pod manifest "/etc/kubernetes/manifests/etcd-pod.yaml" ... 2026-03-18T13:09:20.819424867Z {"kind":"Pod","apiVersion":"v1","metadata":{"name":"etcd","namespace":"openshift-etcd","creationTimestamp":null,"labels":{"app":"etcd","etcd":"true","k8s-app":"etcd","revision":"1"},"annotations":{"kubectl.kubernetes.io/default-container":"etcd","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"}},"spec":{"volumes":[{"name":"static-pod-dir","hostPath":{"path":"/etc/kubernetes/manifests"}},{"name":"resource-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-pod-1"}},{"name":"cert-dir","hostPath":{"path":"/etc/kubernetes/static-pod-resources/etcd-certs"}},{"name":"data-dir","hostPath":{"path":"/var/lib/etcd","type":""}},{"name":"usr-local-bin","hostPath":{"path":"/usr/local/bin"}},{"name":"log-dir","hostPath":{"path":"/var/log/etcd"}},{"name":"config-dir","hostPath":{"path":"/etc/kubernetes"}},{"name":"etcd-auto-backup-dir","hostPath":{"path":"/var/lib/etcd-auto-backup"}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\necho -n \"Fixing etcd log permissions.\"\nmkdir -p /var/log/etcd \u0026\u0026 chmod 0600 /var/log/etcd\necho -n \"Fixing etcd auto backup permissions.\"\nmkdir -p /var/lib/etcd-auto-backup \u0026\u0026 chmod 0600 /var/lib/etcd-auto-backup\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-ensure-env-vars","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\n: \"${NODE_master_0_ETCD_URL_HOST?not set}\"\n: \"${NODE_master_0_ETCD_NAME?not set}\"\n: \"${NODE_master_0_IP?not set}\"\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_IP}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_IP}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected node IP to be ${NODE_IP} got ${NODE_master_0_IP}\" \u003e\u00262\n exit 1\nfi\n\n# check for ipv4 addresses as well as ipv6 addresses with extra square brackets\nif [[ \"${NODE_master_0_ETCD_URL_HOST}\" != \"${NODE_IP}\" \u0026\u0026 \"${NODE_master_0_ETCD_URL_HOST}\" != \"[${NODE_IP}]\" ]]; then\n # echo the error message to stderr\n echo \"Expected etcd url host to be ${NODE_IP} got ${NODE_master_0_ETCD_URL_HOST}\" \u003e\u00262\n exit 1\nfi\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"NODE_IP","valueFrom":{"fieldRef":{"fieldPath":"status.podIP"}}}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-resources-copy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nrm -f $(grep -l '^### Created by cluster-etcd-operator' /usr/local/bin/*)\ncp -p /etc/kubernetes/static-pod-certs/configmaps/etcd-scripts/*.sh /usr/local/bin\n"],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"usr-local-bin","mountPath":"/usr/local/bin"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"etcdctl","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/bash","-c","trap TERM INT; sleep infinity \u0026 wait"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"10m","memory":"60Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"},{"name":"etcd","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\netcdctl member list || true\n\n# this has a non-zero return code if the command is non-zero. If you use an export first, it doesn't and you\n# will succeed when you should fail.\nETCD_INITIAL_CLUSTER=$(discover-etcd-initial-cluster \\\n --cacert=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --cert=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --key=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --endpoints=${ALL_ETCD_ENDPOINTS} \\\n --data-dir=/var/lib/etcd \\\n --target-peer-url-host=${NODE_master_0_ETCD_URL_HOST} \\\n --target-name=master-0)\nexport ETCD_INITIAL_CLUSTER\n\n# we cannot use the \"normal\" port conflict initcontainer because when we upgrade, the existing static pod will never yield,\n# so we do the detection in etcd container itself.\necho -n \"Waiting for ports 2379, 2380 and 9978 to be released.\"\ntime while [ -n \"$(ss -Htan '( sport = 2379 or sport = 2380 or sport = 9978 )')\" ]; do\n echo -n \".\"\n sleep 1\ndone\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\nenv | grep ETCD | grep -v NODE\n\nset -x\n# See https://etcd.io/docs/v3.4.0/tuning/ for why we use ionice\nexec nice -n -19 ionice -c2 -n0 etcd \\\n --logger=zap \\\n --log-level=info \\\n --experimental-initial-corrupt-check=true \\\n --snapshot-count=10000 \\\n --initial-advertise-peer-urls=https://${NODE_master_0_IP}:2380 \\\n --cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --client-cert-auth=true \\\n --peer-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --peer-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --peer-trusted-ca-file=/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --peer-client-cert-auth=true \\\n --advertise-client-urls=https://${NODE_master_0_IP}:2379 \\\n --listen-client-urls=https://0.0.0.0:2379,unixs://${NODE_master_0_IP}:0 \\\n --listen-peer-urls=https://0.0.0.0:2380 \\\n --metrics=extensive \\\n --listen-metrics-urls=https://0.0.0.0:9978 || mv /etc/kubernetes/etcd-backup-dir/etcd-member.yaml /etc/kubernetes/manifests\n"],"ports":[{"name":"etcd","containerPort":2379,"protocol":"TCP"},{"name":"etcd-peer","containerPort":2380,"protocol":"TCP"},{"name":"etcd-metrics","containerPort":9978,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"300m","memory":"600Mi"}},"volumeMounts":[{"name":"static-pod-dir","mountPath":"/etc/kubernetes/manifests"},{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"livenessProbe":{"httpGet":{"path":"healthz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"readinessProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"timeoutSeconds":30,"periodSeconds":5,"successThreshold":1,"failureThreshold":5},"startupProbe":{"httpGet":{"path":"readyz","port":9980,"scheme":"HTTPS"},"initialDelaySeconds":10,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":18},"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-metrics","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexport ETCD_NAME=${NODE_master_0_ETCD_NAME}\n\nexec nice -n -18 etcd grpc-proxy start \\\n --endpoints https://${NODE_master_0_ETCD_URL_HOST}:9978 \\\n --metrics-addr https://0.0.0.0:9979 \\\n --listen-addr 127.0.0.1:9977 \\\n --advertise-client-url \"\" \\\n --key /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key \\\n --key-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key \\\n --cert /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt \\\n --cert-file /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt \\\n --cacert /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt \\\n --trusted-ca-file /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --tls-min-version $(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"proxy-metrics","containerPort":9979,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"},{"name":"ETCD_STATIC_POD_VERSION","value":"1"}],"resources":{"requests":{"cpu":"40m","memory":"200Mi"}},"volumeMounts":[{"name":"resource-dir","mountPath":"/etc/kubernetes/static-pod-resources"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"},{"name":"data-dir","mountPath":"/var/lib/etcd/"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-readyz","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\nexec nice -n -18 cluster-etcd-operator readyz \\\n --target=https://localhost:2379 \\\n --listen-port=9980 \\\n --serving-cert-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.crt \\\n --serving-key-file=/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-master-0.key \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT) \\\n --listen-cipher-suites TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256 \\\n --listen-tls-min-version=$(ETCD_TLS_MIN_VERSION)\n"],"ports":[{"name":"readyz","containerPort":9980,"protocol":"TCP"}],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"log-dir","mountPath":"/var/log/etcd/"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}},{"name":"etcd-rev","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","command":["/bin/sh","-c","#!/bin/sh\nset -euo pipefail\n\ncluster-etcd-operator rev \\\n --endpoints=$(ALL_ETCD_ENDPOINTS) \\\n --client-cert-file=$(ETCDCTL_CERT) \\\n --client-key-file=$(ETCDCTL_KEY) \\\n --client-cacert-file=$(ETCDCTL_CACERT)\n"],"env":[{"name":"ALL_ETCD_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_API","value":"3"},{"name":"ETCDCTL_CACERT","value":"/etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt"},{"name":"ETCDCTL_CERT","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt"},{"name":"ETCDCTL_ENDPOINTS","value":"https://192.168.32.10:2379"},{"name":"ETCDCTL_KEY","value":"/etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key"},{"name":"ETCD_CIPHER_SUITES","value":"TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256"},{"name":"ETCD_DATA_DIR","value":"/var/lib/etcd"},{"name":"ETCD_ELECTION_TIMEOUT","value":"2500"},{"name":"ETCD_ENABLE_PPROF","value":"true"},{"name":"ETCD_EXPERIMENTAL_MAX_LEARNERS","value":"1"},{"name":"ETCD_EXPERIMENTAL_WARNING_APPLY_DURATION","value":"200ms"},{"name":"ETCD_EXPERIMENTAL_WATCH_PROGRESS_NOTIFY_INTERVAL","value":"5s"},{"name":"ETCD_HEARTBEAT_INTERVAL","value":"500"},{"name":"ETCD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278"},{"name":"ETCD_INITIAL_CLUSTER_STATE","value":"existing"},{"name":"ETCD_QUOTA_BACKEND_BYTES","value":"8589934592"},{"name":"ETCD_SOCKET_REUSE_ADDRESS","value":"true"},{"name":"ETCD_TLS_MIN_VERSION","value":"TLS1.2"},{"name":"NODE_master_0_ETCD_NAME","value":"master-0"},{"name":"NODE_master_0_ETCD_URL_HOST","value":"192.168.32.10"},{"name":"NODE_master_0_IP","value":"192.168.32.10"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"data-dir","mountPath":"/var/lib/etcd"},{"name":"cert-dir","mountPath":"/etc/kubernetes/static-pod-certs"}],"terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"hostNetwork":true,"tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000},"status":{}} 2026-03-18T13:09:35.008201568Z W0318 13:09:35.008019 1 recorder.go:207] Error creating event &Event{ObjectMeta:{installer-1-master-0.189df1801e41cac7.c63ac830 openshift-etcd 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Pod,Namespace:openshift-etcd,Name:installer-1-master-0,UID:f32b4d4d-df54-4fa7-a940-297e064fea44,APIVersion:v1,ResourceVersion:,FieldPath:,},Reason:StaticPodInstallerCompleted,Message:Successfully installed revision 1,Source:EventSource{Component:static-pod-installer,Host:,},FirstTimestamp:2026-03-18 13:09:20.819579591 +0000 UTC m=+31.398950991,LastTimestamp:2026-03-18 13:09:20.819579591 +0000 UTC m=+31.398950991,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:,ReportingInstance:,}: Post "https://172.30.0.1:443/api/v1/namespaces/openshift-etcd/events?timeout=14s": net/http: request canceled (Client.Timeout exceeded while awaiting headers) config/pod/openshift-etcd/logs/etcd-master-0/etcd-rev_current.log0000640000000000000000000000015615156522230023475 0ustar00000000000000002026-03-18T13:10:27.377359323Z I0318 13:10:27.376846 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-readyz_current.log0000640000000000000000000000050215156522230024172 0ustar00000000000000002026-03-18T13:10:17.157785056Z I0318 13:10:17.157557 1 readyz.go:175] Listening on 0.0.0.0:9980 2026-03-18T13:10:33.866474165Z I0318 13:10:33.866387 1 etcdcli_pool.go:70] creating a new cached client 2026-03-18T13:10:38.868004324Z I0318 13:10:38.867853 1 etcdcli_pool.go:70] creating a new cached client config/pod/openshift-etcd/logs/etcd-master-0/etcd-metrics_current.log0000640000000000000000000004121615156522230024351 0ustar00000000000000002026-03-18T13:10:16.901432353Z {"level":"info","ts":"2026-03-18T13:10:16.901191Z","caller":"etcdmain/grpc_proxy.go:237","msg":"gRPC proxy server TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-serving-metrics-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/metrics-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-18T13:10:16.902068091Z {"level":"info","ts":"2026-03-18T13:10:16.902014Z","caller":"etcdmain/grpc_proxy.go:460","msg":"listening for gRPC proxy client requests","address":"127.0.0.1:9977"} 2026-03-18T13:10:16.902362929Z {"level":"info","ts":"2026-03-18T13:10:16.902305Z","caller":"etcdmain/grpc_proxy.go:430","msg":"gRPC proxy client TLS","tls-info":"cert = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.crt, key = /etc/kubernetes/static-pod-certs/secrets/etcd-all-certs/etcd-peer-master-0.key, client-cert=, client-key=, trusted-ca = /etc/kubernetes/static-pod-certs/configmaps/etcd-all-bundles/server-ca-bundle.crt, client-cert-auth = false, crl-file = "} 2026-03-18T13:10:16.902458002Z {"level":"info","ts":"2026-03-18T13:10:16.902397Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel created"} 2026-03-18T13:10:16.902486153Z {"level":"info","ts":"2026-03-18T13:10:16.902461Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] original dial target is: \"etcd-endpoints://0xc0001a8000/192.168.32.10:9978\""} 2026-03-18T13:10:16.902535714Z {"level":"info","ts":"2026-03-18T13:10:16.902494Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] parsed dial target is: {URL:{Scheme:etcd-endpoints Opaque: User: Host:0xc0001a8000 Path:/192.168.32.10:9978 RawPath: OmitHost:false ForceQuery:false RawQuery: Fragment: RawFragment:}}"} 2026-03-18T13:10:16.902535714Z {"level":"info","ts":"2026-03-18T13:10:16.902521Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel authority set to \"192.168.32.10:9978\""} 2026-03-18T13:10:16.902836983Z {"level":"info","ts":"2026-03-18T13:10:16.902786Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Resolver state updated: {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Endpoints\": [\n {\n \"Addresses\": [\n {\n \"Addr\": \"192.168.32.10:9978\",\n \"ServerName\": \"192.168.32.10:9978\",\n \"Attributes\": null,\n \"BalancerAttributes\": null,\n \"Metadata\": null\n }\n ],\n \"Attributes\": null\n }\n ],\n \"ServiceConfig\": {\n \"Config\": {\n \"Config\": null,\n \"LB\": \"round_robin\",\n \"Methods\": {}\n },\n \"Err\": null\n },\n \"Attributes\": null\n} (service config updated; resolver returned new addresses)"} 2026-03-18T13:10:16.902901725Z {"level":"info","ts":"2026-03-18T13:10:16.902846Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel switches to new LB policy \"round_robin\""} 2026-03-18T13:10:16.903028478Z {"level":"info","ts":"2026-03-18T13:10:16.902972Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: got new ClientConn state: {{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] [{[{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }] }] 0xc000512e60 } }"} 2026-03-18T13:10:16.903066879Z {"level":"info","ts":"2026-03-18T13:10:16.903026Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel created"} 2026-03-18T13:10:16.903114441Z {"level":"info","ts":"2026-03-18T13:10:16.903083Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[]}"} 2026-03-18T13:10:16.903137831Z {"level":"info","ts":"2026-03-18T13:10:16.903112Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to CONNECTING"} 2026-03-18T13:10:16.903339727Z {"level":"info","ts":"2026-03-18T13:10:16.903245Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T13:10:16.903385268Z {"level":"info","ts":"2026-03-18T13:10:16.903340Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T13:10:16.903547543Z {"level":"info","ts":"2026-03-18T13:10:16.903467Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, CONNECTING"} 2026-03-18T13:10:16.904511090Z {"level":"info","ts":"2026-03-18T13:10:16.904357Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:16.904647604Z {"level":"warn","ts":"2026-03-18T13:10:16.904534Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:16.904691355Z {"level":"info","ts":"2026-03-18T13:10:16.904652Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:16.904829039Z {"level":"info","ts":"2026-03-18T13:10:16.904749Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, TRANSIENT_FAILURE"} 2026-03-18T13:10:16.904869840Z {"level":"info","ts":"2026-03-18T13:10:16.904835Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to TRANSIENT_FAILURE"} 2026-03-18T13:10:16.906718363Z {"level":"info","ts":"2026-03-18T13:10:16.906627Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3] Server created"} 2026-03-18T13:10:16.906767144Z {"level":"info","ts":"2026-03-18T13:10:16.906740Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Server #3 ListenSocket #4] ListenSocket created"} 2026-03-18T13:10:16.907158255Z {"level":"info","ts":"2026-03-18T13:10:16.907074Z","caller":"etcdmain/grpc_proxy.go:614","msg":"gRPC proxy listening for metrics","address":"https://0.0.0.0:9979"} 2026-03-18T13:10:16.907158255Z {"level":"info","ts":"2026-03-18T13:10:16.907137Z","caller":"etcdmain/grpc_proxy.go:287","msg":"started gRPC proxy","address":"127.0.0.1:9977"} 2026-03-18T13:10:16.907174066Z {"level":"info","ts":"2026-03-18T13:10:16.907149Z","caller":"etcdmain/main.go:44","msg":"notifying init daemon"} 2026-03-18T13:10:16.907174066Z {"level":"info","ts":"2026-03-18T13:10:16.907161Z","caller":"etcdmain/main.go:50","msg":"successfully notified init daemon"} 2026-03-18T13:10:16.907429143Z {"level":"info","ts":"2026-03-18T13:10:16.907392Z","caller":"etcdmain/grpc_proxy.go:277","msg":"gRPC proxy server metrics URL serving"} 2026-03-18T13:10:17.905232015Z {"level":"info","ts":"2026-03-18T13:10:17.905109Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:17.905314088Z {"level":"info","ts":"2026-03-18T13:10:17.905207Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, IDLE"} 2026-03-18T13:10:17.905399530Z {"level":"info","ts":"2026-03-18T13:10:17.905296Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T13:10:17.905428421Z {"level":"info","ts":"2026-03-18T13:10:17.905398Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T13:10:17.905617866Z {"level":"info","ts":"2026-03-18T13:10:17.905547Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, CONNECTING"} 2026-03-18T13:10:17.905794321Z {"level":"info","ts":"2026-03-18T13:10:17.905747Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:17.905815112Z {"level":"warn","ts":"2026-03-18T13:10:17.905791Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:17.905888694Z {"level":"info","ts":"2026-03-18T13:10:17.905854Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:17.905897904Z {"level":"info","ts":"2026-03-18T13:10:17.905886Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, TRANSIENT_FAILURE"} 2026-03-18T13:10:19.551120812Z {"level":"info","ts":"2026-03-18T13:10:19.551018Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:19.551120812Z {"level":"info","ts":"2026-03-18T13:10:19.551088Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, IDLE"} 2026-03-18T13:10:19.551172824Z {"level":"info","ts":"2026-03-18T13:10:19.551127Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T13:10:19.551172824Z {"level":"info","ts":"2026-03-18T13:10:19.551160Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T13:10:19.551456272Z {"level":"info","ts":"2026-03-18T13:10:19.551224Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, CONNECTING"} 2026-03-18T13:10:19.551920425Z {"level":"info","ts":"2026-03-18T13:10:19.551834Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:19.551920425Z {"level":"warn","ts":"2026-03-18T13:10:19.551860Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:19.551920425Z {"level":"info","ts":"2026-03-18T13:10:19.551884Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:19.551920425Z {"level":"info","ts":"2026-03-18T13:10:19.551900Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, TRANSIENT_FAILURE"} 2026-03-18T13:10:21.739421619Z {"level":"info","ts":"2026-03-18T13:10:21.739269Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:21.739421619Z {"level":"info","ts":"2026-03-18T13:10:21.739366Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, IDLE"} 2026-03-18T13:10:21.739512382Z {"level":"info","ts":"2026-03-18T13:10:21.739424Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T13:10:21.739534212Z {"level":"info","ts":"2026-03-18T13:10:21.739514Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T13:10:21.739868122Z {"level":"info","ts":"2026-03-18T13:10:21.739797Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, CONNECTING"} 2026-03-18T13:10:21.739996015Z {"level":"info","ts":"2026-03-18T13:10:21.739911Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] Creating new client transport to \"{Addr: \\\"192.168.32.10:9978\\\", ServerName: \\\"192.168.32.10:9978\\\", }\": connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:21.740111679Z {"level":"warn","ts":"2026-03-18T13:10:21.740036Z","caller":"zapgrpc/zapgrpc.go:191","msg":"[core] [Channel #1 SubChannel #2] grpc: addrConn.createTransport failed to connect to {Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }. Err: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:21.740111679Z {"level":"info","ts":"2026-03-18T13:10:21.740082Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to TRANSIENT_FAILURE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:21.740145779Z {"level":"info","ts":"2026-03-18T13:10:21.740115Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, TRANSIENT_FAILURE"} 2026-03-18T13:10:26.068743473Z {"level":"info","ts":"2026-03-18T13:10:26.068605Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to IDLE, last error: connection error: desc = \"transport: Error while dialing: dial tcp 192.168.32.10:9978: connect: connection refused\""} 2026-03-18T13:10:26.068743473Z {"level":"info","ts":"2026-03-18T13:10:26.068676Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, IDLE"} 2026-03-18T13:10:26.068743473Z {"level":"info","ts":"2026-03-18T13:10:26.068704Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to CONNECTING"} 2026-03-18T13:10:26.068743473Z {"level":"info","ts":"2026-03-18T13:10:26.068729Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel picks a new address \"192.168.32.10:9978\" to connect"} 2026-03-18T13:10:26.068867016Z {"level":"info","ts":"2026-03-18T13:10:26.068835Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, CONNECTING"} 2026-03-18T13:10:26.075078822Z {"level":"info","ts":"2026-03-18T13:10:26.075004Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1 SubChannel #2] Subchannel Connectivity change to READY"} 2026-03-18T13:10:26.075078822Z {"level":"info","ts":"2026-03-18T13:10:26.075044Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[balancer] base.baseBalancer: handle SubConn state change: 0xc00052cd80, READY"} 2026-03-18T13:10:26.075106523Z {"level":"info","ts":"2026-03-18T13:10:26.075075Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[roundrobin] roundrobinPicker: Build called with info: {map[SubConn(id:2):{{Addr: \"192.168.32.10:9978\", ServerName: \"192.168.32.10:9978\", }}]}"} 2026-03-18T13:10:26.075106523Z {"level":"info","ts":"2026-03-18T13:10:26.075093Z","caller":"zapgrpc/zapgrpc.go:174","msg":"[core] [Channel #1] Channel Connectivity change to READY"} config/pod/openshift-etcd/logs/etcd-master-0/etcd_current.log0000640000000000000000000014233215156522230022706 0ustar00000000000000002026-03-18T13:11:41.491203815Z {"level":"info","ts":"2026-03-18T13:11:41.491122Z","caller":"traceutil/trace.go:171","msg":"trace[512104905] linearizableReadLoop","detail":"{readStateIndex:11266; appliedIndex:11265; }","duration":"122.737263ms","start":"2026-03-18T13:11:41.368364Z","end":"2026-03-18T13:11:41.491102Z","steps":["trace[512104905] 'read index received' (duration: 99.344257ms)","trace[512104905] 'applied index is now lower than readState.Index' (duration: 23.392065ms)"],"step_count":2} 2026-03-18T13:11:41.491378420Z {"level":"info","ts":"2026-03-18T13:11:41.491188Z","caller":"traceutil/trace.go:171","msg":"trace[2064078254] transaction","detail":"{read_only:false; response_revision:10615; number_of_response:1; }","duration":"122.833515ms","start":"2026-03-18T13:11:41.368321Z","end":"2026-03-18T13:11:41.491155Z","steps":["trace[2064078254] 'process raft request' (duration: 99.43914ms)","trace[2064078254] 'compare' (duration: 23.21767ms)"],"step_count":2} 2026-03-18T13:11:41.491378420Z {"level":"info","ts":"2026-03-18T13:11:41.491272Z","caller":"traceutil/trace.go:171","msg":"trace[39831877] range","detail":"{range_begin:/kubernetes.io/roles/openshift-route-controller-manager/system:openshift:openshift-controller-manager:leader-locking-ingress-to-route-controller; range_end:; response_count:0; response_revision:10615; }","duration":"122.908678ms","start":"2026-03-18T13:11:41.368340Z","end":"2026-03-18T13:11:41.491248Z","steps":["trace[39831877] 'agreement among raft nodes before linearized reading' (duration: 122.858886ms)"],"step_count":1} 2026-03-18T13:11:41.513116708Z {"level":"info","ts":"2026-03-18T13:11:41.511680Z","caller":"traceutil/trace.go:171","msg":"trace[1062848539] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/cluster-version-operator; range_end:; response_count:1; response_revision:10615; }","duration":"123.652399ms","start":"2026-03-18T13:11:41.388014Z","end":"2026-03-18T13:11:41.511666Z","steps":["trace[1062848539] 'agreement among raft nodes before linearized reading' (duration: 123.637079ms)"],"step_count":1} 2026-03-18T13:11:41.513116708Z {"level":"info","ts":"2026-03-18T13:11:41.511878Z","caller":"traceutil/trace.go:171","msg":"trace[1098298543] range","detail":"{range_begin:/kubernetes.io/events/openshift-kube-scheduler/; range_end:/kubernetes.io/events/openshift-kube-scheduler0; response_count:19; response_revision:10615; }","duration":"133.632027ms","start":"2026-03-18T13:11:41.378239Z","end":"2026-03-18T13:11:41.511872Z","steps":["trace[1098298543] 'agreement among raft nodes before linearized reading' (duration: 133.545464ms)"],"step_count":1} 2026-03-18T13:11:41.513116708Z {"level":"info","ts":"2026-03-18T13:11:41.512041Z","caller":"traceutil/trace.go:171","msg":"trace[694815998] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/operatorgroups; range_end:; response_count:0; response_revision:10615; }","duration":"135.170931ms","start":"2026-03-18T13:11:41.376854Z","end":"2026-03-18T13:11:41.512025Z","steps":["trace[694815998] 'agreement among raft nodes before linearized reading' (duration: 135.13705ms)"],"step_count":1} 2026-03-18T13:11:41.513116708Z {"level":"info","ts":"2026-03-18T13:11:41.512251Z","caller":"traceutil/trace.go:171","msg":"trace[1435109338] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver; range_end:; response_count:1; response_revision:10615; }","duration":"142.790472ms","start":"2026-03-18T13:11:41.369455Z","end":"2026-03-18T13:11:41.512246Z","steps":["trace[1435109338] 'agreement among raft nodes before linearized reading' (duration: 142.769521ms)"],"step_count":1} 2026-03-18T13:11:41.713682367Z {"level":"info","ts":"2026-03-18T13:11:41.713584Z","caller":"traceutil/trace.go:171","msg":"trace[1777824694] transaction","detail":"{read_only:false; response_revision:10618; number_of_response:1; }","duration":"181.531539ms","start":"2026-03-18T13:11:41.532032Z","end":"2026-03-18T13:11:41.713564Z","steps":["trace[1777824694] 'process raft request' (duration: 85.623771ms)","trace[1777824694] 'compare' (duration: 95.492556ms)"],"step_count":2} 2026-03-18T13:11:41.713746469Z {"level":"info","ts":"2026-03-18T13:11:41.713652Z","caller":"traceutil/trace.go:171","msg":"trace[609473215] transaction","detail":"{read_only:false; response_revision:10620; number_of_response:1; }","duration":"149.945657ms","start":"2026-03-18T13:11:41.563690Z","end":"2026-03-18T13:11:41.713636Z","steps":["trace[609473215] 'process raft request' (duration: 149.912767ms)"],"step_count":1} 2026-03-18T13:11:41.713835531Z {"level":"info","ts":"2026-03-18T13:11:41.713804Z","caller":"traceutil/trace.go:171","msg":"trace[201142148] linearizableReadLoop","detail":"{readStateIndex:11270; appliedIndex:11269; }","duration":"181.016475ms","start":"2026-03-18T13:11:41.532782Z","end":"2026-03-18T13:11:41.713799Z","steps":["trace[201142148] 'read index received' (duration: 84.944832ms)","trace[201142148] 'applied index is now lower than readState.Index' (duration: 96.066863ms)"],"step_count":2} 2026-03-18T13:11:41.713897163Z {"level":"info","ts":"2026-03-18T13:11:41.713848Z","caller":"traceutil/trace.go:171","msg":"trace[1474968886] transaction","detail":"{read_only:false; response_revision:10619; number_of_response:1; }","duration":"165.786725ms","start":"2026-03-18T13:11:41.548055Z","end":"2026-03-18T13:11:41.713841Z","steps":["trace[1474968886] 'process raft request' (duration: 165.466686ms)"],"step_count":1} 2026-03-18T13:11:41.714274404Z {"level":"info","ts":"2026-03-18T13:11:41.713911Z","caller":"traceutil/trace.go:171","msg":"trace[1657937768] range","detail":"{range_begin:/kubernetes.io/clusterroles/system:openshift:openshift-controller-manager; range_end:; response_count:1; response_revision:10620; }","duration":"181.148358ms","start":"2026-03-18T13:11:41.532754Z","end":"2026-03-18T13:11:41.713902Z","steps":["trace[1657937768] 'agreement among raft nodes before linearized reading' (duration: 181.116297ms)"],"step_count":1} 2026-03-18T13:11:41.714274404Z {"level":"info","ts":"2026-03-18T13:11:41.714039Z","caller":"traceutil/trace.go:171","msg":"trace[2026445917] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-kube-controller-manager/prometheus-k8s; range_end:; response_count:1; response_revision:10620; }","duration":"176.077312ms","start":"2026-03-18T13:11:41.537957Z","end":"2026-03-18T13:11:41.714034Z","steps":["trace[2026445917] 'agreement among raft nodes before linearized reading' (duration: 176.063132ms)"],"step_count":1} 2026-03-18T13:11:41.714274404Z {"level":"info","ts":"2026-03-18T13:11:41.714242Z","caller":"traceutil/trace.go:171","msg":"trace[549487009] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-cluster-olm-operator/cluster-olm-operator-metrics; range_end:; response_count:1; response_revision:10620; }","duration":"125.133602ms","start":"2026-03-18T13:11:41.589101Z","end":"2026-03-18T13:11:41.714234Z","steps":["trace[549487009] 'agreement among raft nodes before linearized reading' (duration: 125.109271ms)"],"step_count":1} 2026-03-18T13:11:41.714311115Z {"level":"info","ts":"2026-03-18T13:11:41.714292Z","caller":"traceutil/trace.go:171","msg":"trace[418543945] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10620; }","duration":"151.858373ms","start":"2026-03-18T13:11:41.562427Z","end":"2026-03-18T13:11:41.714285Z","steps":["trace[418543945] 'agreement among raft nodes before linearized reading' (duration: 151.842813ms)"],"step_count":1} 2026-03-18T13:11:41.716181859Z {"level":"info","ts":"2026-03-18T13:11:41.714406Z","caller":"traceutil/trace.go:171","msg":"trace[474482194] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-authentication/prometheus-k8s; range_end:; response_count:1; response_revision:10620; }","duration":"152.08449ms","start":"2026-03-18T13:11:41.562316Z","end":"2026-03-18T13:11:41.714401Z","steps":["trace[474482194] 'agreement among raft nodes before linearized reading' (duration: 152.061489ms)"],"step_count":1} 2026-03-18T13:11:41.716181859Z {"level":"info","ts":"2026-03-18T13:11:41.714510Z","caller":"traceutil/trace.go:171","msg":"trace[1641149456] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10620; }","duration":"152.195572ms","start":"2026-03-18T13:11:41.562308Z","end":"2026-03-18T13:11:41.714503Z","steps":["trace[1641149456] 'agreement among raft nodes before linearized reading' (duration: 152.180352ms)"],"step_count":1} 2026-03-18T13:11:41.716652952Z {"level":"info","ts":"2026-03-18T13:11:41.716379Z","caller":"traceutil/trace.go:171","msg":"trace[1460765170] range","detail":"{range_begin:/kubernetes.io/roles/openshift-config-managed/machine-approver; range_end:; response_count:1; response_revision:10620; }","duration":"100.613154ms","start":"2026-03-18T13:11:41.615737Z","end":"2026-03-18T13:11:41.716350Z","steps":["trace[1460765170] 'agreement among raft nodes before linearized reading' (duration: 100.554512ms)"],"step_count":1} 2026-03-18T13:11:41.971526159Z {"level":"info","ts":"2026-03-18T13:11:41.970243Z","caller":"traceutil/trace.go:171","msg":"trace[672180508] linearizableReadLoop","detail":"{readStateIndex:11276; appliedIndex:11275; }","duration":"176.537426ms","start":"2026-03-18T13:11:41.793693Z","end":"2026-03-18T13:11:41.970230Z","steps":["trace[672180508] 'read index received' (duration: 26.612028ms)","trace[672180508] 'applied index is now lower than readState.Index' (duration: 149.924668ms)"],"step_count":2} 2026-03-18T13:11:41.971526159Z {"level":"info","ts":"2026-03-18T13:11:41.970323Z","caller":"traceutil/trace.go:171","msg":"trace[150965790] transaction","detail":"{read_only:false; response_revision:10624; number_of_response:1; }","duration":"177.270757ms","start":"2026-03-18T13:11:41.793046Z","end":"2026-03-18T13:11:41.970317Z","steps":["trace[150965790] 'process raft request' (duration: 27.301038ms)","trace[150965790] 'compare' (duration: 149.779304ms)"],"step_count":2} 2026-03-18T13:11:41.971526159Z {"level":"info","ts":"2026-03-18T13:11:41.970399Z","caller":"traceutil/trace.go:171","msg":"trace[2068188519] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-config-managed/cloud-credential-operator; range_end:; response_count:1; response_revision:10624; }","duration":"158.515495ms","start":"2026-03-18T13:11:41.811872Z","end":"2026-03-18T13:11:41.970388Z","steps":["trace[2068188519] 'agreement among raft nodes before linearized reading' (duration: 158.462814ms)"],"step_count":1} 2026-03-18T13:11:41.971526159Z {"level":"info","ts":"2026-03-18T13:11:41.970550Z","caller":"traceutil/trace.go:171","msg":"trace[1605206636] range","detail":"{range_begin:/kubernetes.io/clusterroles/openshift-csi-snapshot-controller-runner; range_end:; response_count:1; response_revision:10624; }","duration":"107.914045ms","start":"2026-03-18T13:11:41.862629Z","end":"2026-03-18T13:11:41.970543Z","steps":["trace[1605206636] 'agreement among raft nodes before linearized reading' (duration: 107.888374ms)"],"step_count":1} 2026-03-18T13:11:41.971526159Z {"level":"info","ts":"2026-03-18T13:11:41.970678Z","caller":"traceutil/trace.go:171","msg":"trace[1943627357] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-cluster-total; range_end:; response_count:1; response_revision:10624; }","duration":"133.590255ms","start":"2026-03-18T13:11:41.837082Z","end":"2026-03-18T13:11:41.970672Z","steps":["trace[1943627357] 'agreement among raft nodes before linearized reading' (duration: 133.557514ms)"],"step_count":1} 2026-03-18T13:11:41.971526159Z {"level":"info","ts":"2026-03-18T13:11:41.970705Z","caller":"traceutil/trace.go:171","msg":"trace[325779021] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-route-controller-manager/system:openshift:leader-locking-openshift-route-controller-manager; range_end:; response_count:1; response_revision:10624; }","duration":"177.00916ms","start":"2026-03-18T13:11:41.793670Z","end":"2026-03-18T13:11:41.970679Z","steps":["trace[325779021] 'agreement among raft nodes before linearized reading' (duration: 176.970929ms)"],"step_count":1} 2026-03-18T13:11:42.200880889Z {"level":"info","ts":"2026-03-18T13:11:42.200780Z","caller":"traceutil/trace.go:171","msg":"trace[641357446] transaction","detail":"{read_only:false; response_revision:10626; number_of_response:1; }","duration":"168.622607ms","start":"2026-03-18T13:11:42.032138Z","end":"2026-03-18T13:11:42.200760Z","steps":["trace[641357446] 'process raft request' (duration: 166.760164ms)"],"step_count":1} 2026-03-18T13:11:42.200960031Z {"level":"info","ts":"2026-03-18T13:11:42.200746Z","caller":"traceutil/trace.go:171","msg":"trace[1832298654] linearizableReadLoop","detail":"{readStateIndex:11278; appliedIndex:11277; }","duration":"167.316619ms","start":"2026-03-18T13:11:42.033404Z","end":"2026-03-18T13:11:42.200720Z","steps":["trace[1832298654] 'read index received' (duration: 165.429795ms)","trace[1832298654] 'applied index is now lower than readState.Index' (duration: 1.885984ms)"],"step_count":2} 2026-03-18T13:11:42.200977042Z {"level":"info","ts":"2026-03-18T13:11:42.200909Z","caller":"traceutil/trace.go:171","msg":"trace[1581646944] range","detail":"{range_begin:/kubernetes.io/apiregistration.k8s.io/apiservices/v1.route.openshift.io; range_end:; response_count:1; response_revision:10626; }","duration":"167.513905ms","start":"2026-03-18T13:11:42.033380Z","end":"2026-03-18T13:11:42.200894Z","steps":["trace[1581646944] 'agreement among raft nodes before linearized reading' (duration: 167.435353ms)"],"step_count":1} 2026-03-18T13:11:42.208127228Z {"level":"info","ts":"2026-03-18T13:11:42.207995Z","caller":"traceutil/trace.go:171","msg":"trace[1606372566] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/system:openshift:operator:authentication; range_end:; response_count:1; response_revision:10626; }","duration":"146.381275ms","start":"2026-03-18T13:11:42.061605Z","end":"2026-03-18T13:11:42.207986Z","steps":["trace[1606372566] 'agreement among raft nodes before linearized reading' (duration: 146.314653ms)"],"step_count":1} 2026-03-18T13:11:42.208127228Z {"level":"info","ts":"2026-03-18T13:11:42.208052Z","caller":"traceutil/trace.go:171","msg":"trace[836361244] transaction","detail":"{read_only:false; number_of_response:0; response_revision:10626; }","duration":"133.996427ms","start":"2026-03-18T13:11:42.074037Z","end":"2026-03-18T13:11:42.208034Z","steps":["trace[836361244] 'process raft request' (duration: 133.800682ms)"],"step_count":1} 2026-03-18T13:11:42.208218230Z {"level":"info","ts":"2026-03-18T13:11:42.208150Z","caller":"traceutil/trace.go:171","msg":"trace[1610881194] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10626; }","duration":"174.733853ms","start":"2026-03-18T13:11:42.033411Z","end":"2026-03-18T13:11:42.208145Z","steps":["trace[1610881194] 'agreement among raft nodes before linearized reading' (duration: 174.719733ms)"],"step_count":1} 2026-03-18T13:11:42.208218230Z {"level":"info","ts":"2026-03-18T13:11:42.208145Z","caller":"traceutil/trace.go:171","msg":"trace[548775726] range","detail":"{range_begin:/kubernetes.io/roles/openshift-route-controller-manager/prometheus-k8s; range_end:; response_count:1; response_revision:10626; }","duration":"174.292121ms","start":"2026-03-18T13:11:42.033834Z","end":"2026-03-18T13:11:42.208126Z","steps":["trace[548775726] 'agreement among raft nodes before linearized reading' (duration: 174.25612ms)"],"step_count":1} 2026-03-18T13:11:42.208351894Z {"level":"info","ts":"2026-03-18T13:11:42.208246Z","caller":"traceutil/trace.go:171","msg":"trace[1548706429] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-network-operator/prometheus-k8s; range_end:; response_count:1; response_revision:10626; }","duration":"121.741384ms","start":"2026-03-18T13:11:42.086485Z","end":"2026-03-18T13:11:42.208227Z","steps":["trace[1548706429] 'agreement among raft nodes before linearized reading' (duration: 121.691902ms)"],"step_count":1} 2026-03-18T13:11:42.208351894Z {"level":"info","ts":"2026-03-18T13:11:42.208269Z","caller":"traceutil/trace.go:171","msg":"trace[697035373] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/probes.monitoring.coreos.com; range_end:; response_count:1; response_revision:10626; }","duration":"171.438488ms","start":"2026-03-18T13:11:42.036819Z","end":"2026-03-18T13:11:42.208257Z","steps":["trace[697035373] 'agreement among raft nodes before linearized reading' (duration: 171.391146ms)"],"step_count":1} 2026-03-18T13:11:42.208351894Z {"level":"info","ts":"2026-03-18T13:11:42.208324Z","caller":"traceutil/trace.go:171","msg":"trace[1698843168] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10626; }","duration":"174.327311ms","start":"2026-03-18T13:11:42.033984Z","end":"2026-03-18T13:11:42.208311Z","steps":["trace[1698843168] 'agreement among raft nodes before linearized reading' (duration: 174.308971ms)"],"step_count":1} 2026-03-18T13:11:42.208496409Z {"level":"info","ts":"2026-03-18T13:11:42.208378Z","caller":"traceutil/trace.go:171","msg":"trace[1442264716] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:10626; }","duration":"169.768289ms","start":"2026-03-18T13:11:42.038586Z","end":"2026-03-18T13:11:42.208355Z","steps":["trace[1442264716] 'agreement among raft nodes before linearized reading' (duration: 169.703688ms)"],"step_count":1} 2026-03-18T13:11:42.210168787Z {"level":"info","ts":"2026-03-18T13:11:42.208537Z","caller":"traceutil/trace.go:171","msg":"trace[626839707] range","detail":"{range_begin:/kubernetes.io/events/openshift-apiserver-operator/; range_end:/kubernetes.io/events/openshift-apiserver-operator0; response_count:74; response_revision:10626; }","duration":"126.298405ms","start":"2026-03-18T13:11:42.082221Z","end":"2026-03-18T13:11:42.208519Z","steps":["trace[626839707] 'agreement among raft nodes before linearized reading' (duration: 125.706778ms)"],"step_count":1} 2026-03-18T13:11:42.936351817Z {"level":"info","ts":"2026-03-18T13:11:42.936257Z","caller":"traceutil/trace.go:171","msg":"trace[1952310692] linearizableReadLoop","detail":"{readStateIndex:11295; appliedIndex:11294; }","duration":"107.855263ms","start":"2026-03-18T13:11:42.828386Z","end":"2026-03-18T13:11:42.936241Z","steps":["trace[1952310692] 'read index received' (duration: 107.687628ms)","trace[1952310692] 'applied index is now lower than readState.Index' (duration: 166.875µs)"],"step_count":2} 2026-03-18T13:11:42.936399838Z {"level":"info","ts":"2026-03-18T13:11:42.936355Z","caller":"traceutil/trace.go:171","msg":"trace[1725127560] transaction","detail":"{read_only:false; response_revision:10641; number_of_response:1; }","duration":"108.858682ms","start":"2026-03-18T13:11:42.827473Z","end":"2026-03-18T13:11:42.936332Z","steps":["trace[1725127560] 'process raft request' (duration: 108.676137ms)"],"step_count":1} 2026-03-18T13:11:42.936508351Z {"level":"info","ts":"2026-03-18T13:11:42.936476Z","caller":"traceutil/trace.go:171","msg":"trace[1093689016] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusterversions/version; range_end:; response_count:1; response_revision:10641; }","duration":"108.11351ms","start":"2026-03-18T13:11:42.828351Z","end":"2026-03-18T13:11:42.936465Z","steps":["trace[1093689016] 'agreement among raft nodes before linearized reading' (duration: 107.977946ms)"],"step_count":1} 2026-03-18T13:11:43.237498758Z {"level":"info","ts":"2026-03-18T13:11:43.236788Z","caller":"traceutil/trace.go:171","msg":"trace[1656818305] range","detail":"{range_begin:/kubernetes.io/configmaps/openshift-config-managed/dashboard-k8s-resources-cluster; range_end:; response_count:1; response_revision:10641; }","duration":"199.975723ms","start":"2026-03-18T13:11:43.036799Z","end":"2026-03-18T13:11:43.236775Z","steps":["trace[1656818305] 'range keys from in-memory index tree' (duration: 199.861889ms)"],"step_count":1} 2026-03-18T13:11:43.237498758Z {"level":"warn","ts":"2026-03-18T13:11:43.236918Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"200.112886ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T13:11:43.237498758Z {"level":"info","ts":"2026-03-18T13:11:43.236923Z","caller":"traceutil/trace.go:171","msg":"trace[483975515] range","detail":"{range_begin:/kubernetes.io/deployments/openshift-controller-manager-operator/openshift-controller-manager-operator; range_end:; response_count:1; response_revision:10641; }","duration":"173.699473ms","start":"2026-03-18T13:11:43.063209Z","end":"2026-03-18T13:11:43.236908Z","steps":["trace[483975515] 'range keys from in-memory index tree' (duration: 173.620822ms)"],"step_count":1} 2026-03-18T13:11:43.237498758Z {"level":"info","ts":"2026-03-18T13:11:43.236969Z","caller":"traceutil/trace.go:171","msg":"trace[1907961150] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:10641; }","duration":"200.2436ms","start":"2026-03-18T13:11:43.036718Z","end":"2026-03-18T13:11:43.236961Z","steps":["trace[1907961150] 'range keys from in-memory index tree' (duration: 200.015664ms)"],"step_count":1} 2026-03-18T13:11:43.237498758Z {"level":"info","ts":"2026-03-18T13:11:43.237037Z","caller":"traceutil/trace.go:171","msg":"trace[1743980453] range","detail":"{range_begin:/kubernetes.io/pods/openshift-machine-config-operator/machine-config-controller-b4f87c5b9-qpp2s; range_end:; response_count:1; response_revision:10641; }","duration":"168.634508ms","start":"2026-03-18T13:11:43.068390Z","end":"2026-03-18T13:11:43.237024Z","steps":["trace[1743980453] 'range keys from in-memory index tree' (duration: 168.559475ms)"],"step_count":1} 2026-03-18T13:11:43.237498758Z {"level":"info","ts":"2026-03-18T13:11:43.237071Z","caller":"traceutil/trace.go:171","msg":"trace[1262006421] range","detail":"{range_begin:/kubernetes.io/operator.openshift.io/olms/cluster; range_end:; response_count:1; response_revision:10641; }","duration":"186.108512ms","start":"2026-03-18T13:11:43.050952Z","end":"2026-03-18T13:11:43.237061Z","steps":["trace[1262006421] 'range keys from in-memory index tree' (duration: 185.960247ms)"],"step_count":1} 2026-03-18T13:11:43.237498758Z {"level":"info","ts":"2026-03-18T13:11:43.237334Z","caller":"traceutil/trace.go:171","msg":"trace[300557813] transaction","detail":"{read_only:false; response_revision:10642; number_of_response:1; }","duration":"167.753622ms","start":"2026-03-18T13:11:43.069572Z","end":"2026-03-18T13:11:43.237325Z","steps":["trace[300557813] 'process raft request' (duration: 144.730278ms)","trace[300557813] 'compare' (duration: 22.365945ms)"],"step_count":2} 2026-03-18T13:11:43.237498758Z {"level":"info","ts":"2026-03-18T13:11:43.237454Z","caller":"traceutil/trace.go:171","msg":"trace[1292186190] linearizableReadLoop","detail":"{readStateIndex:11296; appliedIndex:11295; }","duration":"155.179549ms","start":"2026-03-18T13:11:43.082268Z","end":"2026-03-18T13:11:43.237448Z","steps":["trace[1292186190] 'read index received' (duration: 132.041371ms)","trace[1292186190] 'applied index is now lower than readState.Index' (duration: 23.137658ms)"],"step_count":2} 2026-03-18T13:11:43.237600611Z {"level":"info","ts":"2026-03-18T13:11:43.236781Z","caller":"traceutil/trace.go:171","msg":"trace[90717248] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/installplans; range_end:; response_count:0; response_revision:10641; }","duration":"177.128143ms","start":"2026-03-18T13:11:43.059633Z","end":"2026-03-18T13:11:43.236762Z","steps":["trace[90717248] 'range keys from in-memory index tree' (duration: 177.02218ms)"],"step_count":1} 2026-03-18T13:11:43.237600611Z {"level":"info","ts":"2026-03-18T13:11:43.237569Z","caller":"traceutil/trace.go:171","msg":"trace[184848889] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-network-operator/network-operator; range_end:; response_count:1; response_revision:10643; }","duration":"100.914443ms","start":"2026-03-18T13:11:43.136650Z","end":"2026-03-18T13:11:43.237564Z","steps":["trace[184848889] 'agreement among raft nodes before linearized reading' (duration: 100.898543ms)"],"step_count":1} 2026-03-18T13:11:43.237667333Z {"level":"info","ts":"2026-03-18T13:11:43.237537Z","caller":"traceutil/trace.go:171","msg":"trace[184089560] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/imagecontentpolicies.config.openshift.io; range_end:; response_count:1; response_revision:10643; }","duration":"150.294338ms","start":"2026-03-18T13:11:43.087237Z","end":"2026-03-18T13:11:43.237531Z","steps":["trace[184089560] 'agreement among raft nodes before linearized reading' (duration: 150.272888ms)"],"step_count":1} 2026-03-18T13:11:43.237705984Z {"level":"info","ts":"2026-03-18T13:11:43.237674Z","caller":"traceutil/trace.go:171","msg":"trace[1022458972] range","detail":"{range_begin:/kubernetes.io/serviceaccounts/openshift-authentication-operator/authentication-operator; range_end:; response_count:1; response_revision:10643; }","duration":"125.093951ms","start":"2026-03-18T13:11:43.112575Z","end":"2026-03-18T13:11:43.237669Z","steps":["trace[1022458972] 'agreement among raft nodes before linearized reading' (duration: 125.073031ms)"],"step_count":1} 2026-03-18T13:11:43.237771216Z {"level":"info","ts":"2026-03-18T13:11:43.237735Z","caller":"traceutil/trace.go:171","msg":"trace[1281939118] range","detail":"{range_begin:/kubernetes.io/events/openshift-operator-lifecycle-manager/; range_end:/kubernetes.io/events/openshift-operator-lifecycle-manager0; response_count:58; response_revision:10643; }","duration":"155.484378ms","start":"2026-03-18T13:11:43.082241Z","end":"2026-03-18T13:11:43.237725Z","steps":["trace[1281939118] 'agreement among raft nodes before linearized reading' (duration: 155.239751ms)"],"step_count":1} 2026-03-18T13:11:43.506181484Z {"level":"info","ts":"2026-03-18T13:11:43.506082Z","caller":"traceutil/trace.go:171","msg":"trace[645979985] range","detail":"{range_begin:/kubernetes.io/metal3.io/firmwareschemas/; range_end:/kubernetes.io/metal3.io/firmwareschemas0; response_count:0; response_revision:10645; }","duration":"143.693117ms","start":"2026-03-18T13:11:43.362364Z","end":"2026-03-18T13:11:43.506057Z","steps":["trace[645979985] 'count revisions from in-memory index tree' (duration: 143.653156ms)"],"step_count":1} 2026-03-18T13:11:43.506181484Z {"level":"info","ts":"2026-03-18T13:11:43.506157Z","caller":"traceutil/trace.go:171","msg":"trace[1261155884] range","detail":"{range_begin:/kubernetes.io/clusterrolebindings/prometheus-k8s-scheduler-resources; range_end:; response_count:1; response_revision:10645; }","duration":"119.50679ms","start":"2026-03-18T13:11:43.386641Z","end":"2026-03-18T13:11:43.506148Z","steps":["trace[1261155884] 'range keys from in-memory index tree' (duration: 119.418047ms)"],"step_count":1} 2026-03-18T13:11:43.506357959Z {"level":"info","ts":"2026-03-18T13:11:43.506317Z","caller":"traceutil/trace.go:171","msg":"trace[491763452] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-ingress-operator/ingress-operator; range_end:; response_count:1; response_revision:10645; }","duration":"169.462891ms","start":"2026-03-18T13:11:43.336845Z","end":"2026-03-18T13:11:43.506308Z","steps":["trace[491763452] 'range keys from in-memory index tree' (duration: 169.373679ms)"],"step_count":1} 2026-03-18T13:11:43.506446191Z {"level":"info","ts":"2026-03-18T13:11:43.506385Z","caller":"traceutil/trace.go:171","msg":"trace[970744743] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10645; }","duration":"117.176502ms","start":"2026-03-18T13:11:43.389192Z","end":"2026-03-18T13:11:43.506368Z","steps":["trace[970744743] 'range keys from in-memory index tree' (duration: 117.141911ms)"],"step_count":1} 2026-03-18T13:11:43.506640007Z {"level":"info","ts":"2026-03-18T13:11:43.506583Z","caller":"traceutil/trace.go:171","msg":"trace[608295587] range","detail":"{range_begin:/kubernetes.io/services/specs/openshift-apiserver/check-endpoints; range_end:; response_count:1; response_revision:10645; }","duration":"144.656365ms","start":"2026-03-18T13:11:43.361919Z","end":"2026-03-18T13:11:43.506576Z","steps":["trace[608295587] 'range keys from in-memory index tree' (duration: 144.551783ms)"],"step_count":1} 2026-03-18T13:11:43.701884812Z {"level":"info","ts":"2026-03-18T13:11:43.701810Z","caller":"traceutil/trace.go:171","msg":"trace[609417449] linearizableReadLoop","detail":"{readStateIndex:11301; appliedIndex:11300; }","duration":"128.702055ms","start":"2026-03-18T13:11:43.573096Z","end":"2026-03-18T13:11:43.701798Z","steps":["trace[609417449] 'read index received' (duration: 128.585711ms)","trace[609417449] 'applied index is now lower than readState.Index' (duration: 115.824µs)"],"step_count":2} 2026-03-18T13:11:43.701922883Z {"level":"info","ts":"2026-03-18T13:11:43.701875Z","caller":"traceutil/trace.go:171","msg":"trace[580265466] transaction","detail":"{read_only:false; response_revision:10647; number_of_response:1; }","duration":"131.600839ms","start":"2026-03-18T13:11:43.570261Z","end":"2026-03-18T13:11:43.701862Z","steps":["trace[580265466] 'process raft request' (duration: 131.448274ms)"],"step_count":1} 2026-03-18T13:11:43.701956064Z {"level":"info","ts":"2026-03-18T13:11:43.701917Z","caller":"traceutil/trace.go:171","msg":"trace[972243967] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/infrastructures/cluster; range_end:; response_count:1; response_revision:10647; }","duration":"128.832159ms","start":"2026-03-18T13:11:43.573078Z","end":"2026-03-18T13:11:43.701910Z","steps":["trace[972243967] 'agreement among raft nodes before linearized reading' (duration: 128.790888ms)"],"step_count":1} 2026-03-18T13:11:43.702196821Z {"level":"info","ts":"2026-03-18T13:11:43.702161Z","caller":"traceutil/trace.go:171","msg":"trace[856386652] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10647; }","duration":"113.268899ms","start":"2026-03-18T13:11:43.588884Z","end":"2026-03-18T13:11:43.702153Z","steps":["trace[856386652] 'agreement among raft nodes before linearized reading' (duration: 113.252519ms)"],"step_count":1} 2026-03-18T13:11:43.702350466Z {"level":"info","ts":"2026-03-18T13:11:43.702324Z","caller":"traceutil/trace.go:171","msg":"trace[524638052] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-kube-apiserver/kube-apiserver-performance-recording-rules; range_end:; response_count:1; response_revision:10647; }","duration":"115.747671ms","start":"2026-03-18T13:11:43.586567Z","end":"2026-03-18T13:11:43.702315Z","steps":["trace[524638052] 'agreement among raft nodes before linearized reading' (duration: 115.72653ms)"],"step_count":1} 2026-03-18T13:11:43.702466659Z {"level":"info","ts":"2026-03-18T13:11:43.701970Z","caller":"traceutil/trace.go:171","msg":"trace[2143051480] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10647; }","duration":"115.606626ms","start":"2026-03-18T13:11:43.586349Z","end":"2026-03-18T13:11:43.701955Z","steps":["trace[2143051480] 'agreement among raft nodes before linearized reading' (duration: 115.562845ms)"],"step_count":1} 2026-03-18T13:11:43.896102308Z {"level":"info","ts":"2026-03-18T13:11:43.895979Z","caller":"traceutil/trace.go:171","msg":"trace[1447182216] transaction","detail":"{read_only:false; response_revision:10649; number_of_response:1; }","duration":"185.156944ms","start":"2026-03-18T13:11:43.710807Z","end":"2026-03-18T13:11:43.895964Z","steps":["trace[1447182216] 'process raft request' (duration: 185.071102ms)"],"step_count":1} 2026-03-18T13:11:43.896694805Z {"level":"info","ts":"2026-03-18T13:11:43.896064Z","caller":"traceutil/trace.go:171","msg":"trace[1316037586] transaction","detail":"{read_only:false; response_revision:10648; number_of_response:1; }","duration":"188.227603ms","start":"2026-03-18T13:11:43.707790Z","end":"2026-03-18T13:11:43.896018Z","steps":["trace[1316037586] 'process raft request' (duration: 173.976691ms)","trace[1316037586] 'compare' (duration: 13.875581ms)"],"step_count":2} 2026-03-18T13:11:43.897074146Z {"level":"info","ts":"2026-03-18T13:11:43.896099Z","caller":"traceutil/trace.go:171","msg":"trace[1771475877] linearizableReadLoop","detail":"{readStateIndex:11302; appliedIndex:11301; }","duration":"186.992808ms","start":"2026-03-18T13:11:43.709094Z","end":"2026-03-18T13:11:43.896087Z","steps":["trace[1771475877] 'read index received' (duration: 172.684145ms)","trace[1771475877] 'applied index is now lower than readState.Index' (duration: 14.307303ms)"],"step_count":2} 2026-03-18T13:11:43.897213920Z {"level":"info","ts":"2026-03-18T13:11:43.897186Z","caller":"traceutil/trace.go:171","msg":"trace[587003383] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-authentication-operator/authentication-operator; range_end:; response_count:1; response_revision:10649; }","duration":"135.158851ms","start":"2026-03-18T13:11:43.762004Z","end":"2026-03-18T13:11:43.897162Z","steps":["trace[587003383] 'agreement among raft nodes before linearized reading' (duration: 135.12508ms)"],"step_count":1} 2026-03-18T13:11:43.897275232Z {"level":"info","ts":"2026-03-18T13:11:43.897211Z","caller":"traceutil/trace.go:171","msg":"trace[2042909714] range","detail":"{range_begin:/openshift.io/templates/; range_end:/openshift.io/templates0; response_count:0; response_revision:10649; }","duration":"184.625749ms","start":"2026-03-18T13:11:43.712568Z","end":"2026-03-18T13:11:43.897193Z","steps":["trace[2042909714] 'agreement among raft nodes before linearized reading' (duration: 184.582217ms)"],"step_count":1} 2026-03-18T13:11:43.897319753Z {"level":"info","ts":"2026-03-18T13:11:43.897272Z","caller":"traceutil/trace.go:171","msg":"trace[654365874] range","detail":"{range_begin:/kubernetes.io/roles/openshift-route-controller-manager/prometheus-k8s; range_end:; response_count:1; response_revision:10649; }","duration":"185.654458ms","start":"2026-03-18T13:11:43.711599Z","end":"2026-03-18T13:11:43.897254Z","steps":["trace[654365874] 'agreement among raft nodes before linearized reading' (duration: 185.623317ms)"],"step_count":1} 2026-03-18T13:11:43.897406896Z {"level":"info","ts":"2026-03-18T13:11:43.897183Z","caller":"traceutil/trace.go:171","msg":"trace[408678783] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver; range_end:; response_count:1; response_revision:10649; }","duration":"188.012907ms","start":"2026-03-18T13:11:43.709150Z","end":"2026-03-18T13:11:43.897163Z","steps":["trace[408678783] 'agreement among raft nodes before linearized reading' (duration: 187.951605ms)"],"step_count":1} 2026-03-18T13:11:43.897520819Z {"level":"info","ts":"2026-03-18T13:11:43.897209Z","caller":"traceutil/trace.go:171","msg":"trace[1720818403] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-kube-controller-manager-operator/kube-controller-manager-operator; range_end:; response_count:1; response_revision:10649; }","duration":"160.520774ms","start":"2026-03-18T13:11:43.736677Z","end":"2026-03-18T13:11:43.897198Z","steps":["trace[1720818403] 'agreement among raft nodes before linearized reading' (duration: 160.494733ms)"],"step_count":1} 2026-03-18T13:11:43.897593591Z {"level":"info","ts":"2026-03-18T13:11:43.897247Z","caller":"traceutil/trace.go:171","msg":"trace[1814324505] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10649; }","duration":"107.899774ms","start":"2026-03-18T13:11:43.789343Z","end":"2026-03-18T13:11:43.897243Z","steps":["trace[1814324505] 'agreement among raft nodes before linearized reading' (duration: 107.888334ms)"],"step_count":1} 2026-03-18T13:11:43.897654253Z {"level":"info","ts":"2026-03-18T13:11:43.896177Z","caller":"traceutil/trace.go:171","msg":"trace[659399822] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/operatorgroups; range_end:; response_count:0; response_revision:10649; }","duration":"187.09857ms","start":"2026-03-18T13:11:43.709074Z","end":"2026-03-18T13:11:43.896173Z","steps":["trace[659399822] 'agreement among raft nodes before linearized reading' (duration: 187.055669ms)"],"step_count":1} 2026-03-18T13:11:43.897664103Z {"level":"info","ts":"2026-03-18T13:11:43.897512Z","caller":"traceutil/trace.go:171","msg":"trace[1683052741] range","detail":"{range_begin:/kubernetes.io/clusterroles/insights-operator-gather; range_end:; response_count:1; response_revision:10649; }","duration":"111.325394ms","start":"2026-03-18T13:11:43.786177Z","end":"2026-03-18T13:11:43.897502Z","steps":["trace[1683052741] 'agreement among raft nodes before linearized reading' (duration: 111.287032ms)"],"step_count":1} 2026-03-18T13:11:44.534682130Z {"level":"info","ts":"2026-03-18T13:11:44.534539Z","caller":"traceutil/trace.go:171","msg":"trace[1429015061] transaction","detail":"{read_only:false; response_revision:10668; number_of_response:1; }","duration":"213.267365ms","start":"2026-03-18T13:11:44.321256Z","end":"2026-03-18T13:11:44.534523Z","steps":["trace[1429015061] 'process raft request' (duration: 190.350844ms)","trace[1429015061] 'compare' (duration: 22.794558ms)"],"step_count":2} 2026-03-18T13:11:44.534682130Z {"level":"info","ts":"2026-03-18T13:11:44.534524Z","caller":"traceutil/trace.go:171","msg":"trace[1084714354] linearizableReadLoop","detail":"{readStateIndex:11323; appliedIndex:11322; }","duration":"211.68916ms","start":"2026-03-18T13:11:44.322817Z","end":"2026-03-18T13:11:44.534506Z","steps":["trace[1084714354] 'read index received' (duration: 188.801469ms)","trace[1084714354] 'applied index is now lower than readState.Index' (duration: 22.886901ms)"],"step_count":2} 2026-03-18T13:11:44.534682130Z {"level":"warn","ts":"2026-03-18T13:11:44.534621Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"211.787172ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/machineconfiguration.openshift.io/machineconfigs\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T13:11:44.534682130Z {"level":"info","ts":"2026-03-18T13:11:44.534647Z","caller":"traceutil/trace.go:171","msg":"trace[2009835239] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/machineconfigs; range_end:; response_count:0; response_revision:10668; }","duration":"211.847465ms","start":"2026-03-18T13:11:44.322793Z","end":"2026-03-18T13:11:44.534640Z","steps":["trace[2009835239] 'agreement among raft nodes before linearized reading' (duration: 211.766852ms)"],"step_count":1} 2026-03-18T13:11:44.545203713Z {"level":"info","ts":"2026-03-18T13:11:44.545129Z","caller":"traceutil/trace.go:171","msg":"trace[469443845] range","detail":"{range_begin:/kubernetes.io/namespaces/openshift-machine-api; range_end:; response_count:1; response_revision:10669; }","duration":"107.354559ms","start":"2026-03-18T13:11:44.437755Z","end":"2026-03-18T13:11:44.545109Z","steps":["trace[469443845] 'agreement among raft nodes before linearized reading' (duration: 107.328628ms)"],"step_count":1} 2026-03-18T13:11:44.545203713Z {"level":"info","ts":"2026-03-18T13:11:44.545157Z","caller":"traceutil/trace.go:171","msg":"trace[1696547619] transaction","detail":"{read_only:false; response_revision:10669; number_of_response:1; }","duration":"188.347467ms","start":"2026-03-18T13:11:44.356795Z","end":"2026-03-18T13:11:44.545142Z","steps":["trace[1696547619] 'process raft request' (duration: 187.951475ms)"],"step_count":1} 2026-03-18T13:11:44.545322787Z {"level":"info","ts":"2026-03-18T13:11:44.545295Z","caller":"traceutil/trace.go:171","msg":"trace[1054670042] range","detail":"{range_begin:/kubernetes.io/rolebindings/openshift-config/ingress-operator; range_end:; response_count:1; response_revision:10669; }","duration":"132.638049ms","start":"2026-03-18T13:11:44.412650Z","end":"2026-03-18T13:11:44.545288Z","steps":["trace[1054670042] 'agreement among raft nodes before linearized reading' (duration: 132.616418ms)"],"step_count":1} 2026-03-18T13:11:44.545418290Z {"level":"warn","ts":"2026-03-18T13:11:44.545369Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"208.246841ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/mutatingwebhookconfigurations\" limit:1 ","response":"range_response_count:0 size:5"} 2026-03-18T13:11:44.545446180Z {"level":"info","ts":"2026-03-18T13:11:44.545422Z","caller":"traceutil/trace.go:171","msg":"trace[2039077603] range","detail":"{range_begin:/kubernetes.io/serviceaccounts; range_end:; response_count:0; response_revision:10669; }","duration":"155.865059ms","start":"2026-03-18T13:11:44.389553Z","end":"2026-03-18T13:11:44.545418Z","steps":["trace[2039077603] 'agreement among raft nodes before linearized reading' (duration: 155.854618ms)"],"step_count":1} 2026-03-18T13:11:44.545475281Z {"level":"info","ts":"2026-03-18T13:11:44.545424Z","caller":"traceutil/trace.go:171","msg":"trace[1850901462] range","detail":"{range_begin:/kubernetes.io/mutatingwebhookconfigurations; range_end:; response_count:0; response_revision:10669; }","duration":"208.343554ms","start":"2026-03-18T13:11:44.337073Z","end":"2026-03-18T13:11:44.545417Z","steps":["trace[1850901462] 'agreement among raft nodes before linearized reading' (duration: 208.253651ms)"],"step_count":1} 2026-03-18T13:11:44.545495502Z {"level":"warn","ts":"2026-03-18T13:11:44.545478Z","caller":"etcdserver/util.go:170","msg":"apply request took too long","took":"208.184629ms","expected-duration":"200ms","prefix":"read-only range ","request":"key:\"/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/prometheusrules.monitoring.coreos.com\" ","response":"range_response_count:1 size:7821"} 2026-03-18T13:11:44.545524763Z {"level":"info","ts":"2026-03-18T13:11:44.545500Z","caller":"traceutil/trace.go:171","msg":"trace[1658208359] range","detail":"{range_begin:/kubernetes.io/apiextensions.k8s.io/customresourcedefinitions/prometheusrules.monitoring.coreos.com; range_end:; response_count:1; response_revision:10669; }","duration":"208.22514ms","start":"2026-03-18T13:11:44.337268Z","end":"2026-03-18T13:11:44.545493Z","steps":["trace[1658208359] 'agreement among raft nodes before linearized reading' (duration: 208.169798ms)"],"step_count":1} 2026-03-18T13:11:44.545566174Z {"level":"info","ts":"2026-03-18T13:11:44.545389Z","caller":"traceutil/trace.go:171","msg":"trace[2033557872] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-apiserver/openshift-apiserver-operator-check-endpoints; range_end:; response_count:1; response_revision:10669; }","duration":"157.907137ms","start":"2026-03-18T13:11:44.387469Z","end":"2026-03-18T13:11:44.545377Z","steps":["trace[2033557872] 'agreement among raft nodes before linearized reading' (duration: 157.885297ms)"],"step_count":1} 2026-03-18T13:11:44.545632756Z {"level":"info","ts":"2026-03-18T13:11:44.545400Z","caller":"traceutil/trace.go:171","msg":"trace[1537591063] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/servicemonitors/openshift-kube-scheduler/kube-scheduler; range_end:; response_count:1; response_revision:10669; }","duration":"179.932114ms","start":"2026-03-18T13:11:44.365451Z","end":"2026-03-18T13:11:44.545383Z","steps":["trace[1537591063] 'agreement among raft nodes before linearized reading' (duration: 179.917803ms)"],"step_count":1} 2026-03-18T13:11:44.663763656Z {"level":"info","ts":"2026-03-18T13:11:44.663621Z","caller":"traceutil/trace.go:171","msg":"trace[649607345] linearizableReadLoop","detail":"{readStateIndex:11325; appliedIndex:11324; }","duration":"103.678543ms","start":"2026-03-18T13:11:44.559918Z","end":"2026-03-18T13:11:44.663596Z","steps":["trace[649607345] 'read index received' (duration: 96.29056ms)","trace[649607345] 'applied index is now lower than readState.Index' (duration: 7.387173ms)"],"step_count":2} 2026-03-18T13:11:44.663803677Z {"level":"info","ts":"2026-03-18T13:11:44.663749Z","caller":"traceutil/trace.go:171","msg":"trace[1352217298] range","detail":"{range_begin:/kubernetes.io/validatingwebhookconfigurations; range_end:; response_count:0; response_revision:10670; }","duration":"103.840837ms","start":"2026-03-18T13:11:44.559898Z","end":"2026-03-18T13:11:44.663739Z","steps":["trace[1352217298] 'agreement among raft nodes before linearized reading' (duration: 103.805836ms)"],"step_count":1} 2026-03-18T13:11:44.663803677Z {"level":"info","ts":"2026-03-18T13:11:44.663666Z","caller":"traceutil/trace.go:171","msg":"trace[283070458] transaction","detail":"{read_only:false; response_revision:10670; number_of_response:1; }","duration":"104.422104ms","start":"2026-03-18T13:11:44.559222Z","end":"2026-03-18T13:11:44.663644Z","steps":["trace[283070458] 'process raft request' (duration: 96.99866ms)"],"step_count":1} 2026-03-18T13:11:44.663895469Z {"level":"info","ts":"2026-03-18T13:11:44.663840Z","caller":"traceutil/trace.go:171","msg":"trace[777473753] range","detail":"{range_begin:/kubernetes.io/roles/openshift-cluster-samples-operator/cluster-samples-operator; range_end:; response_count:1; response_revision:10670; }","duration":"102.653773ms","start":"2026-03-18T13:11:44.561175Z","end":"2026-03-18T13:11:44.663828Z","steps":["trace[777473753] 'agreement among raft nodes before linearized reading' (duration: 102.629003ms)"],"step_count":1} 2026-03-18T13:11:44.809016988Z {"level":"info","ts":"2026-03-18T13:11:44.808833Z","caller":"traceutil/trace.go:171","msg":"trace[1267575461] transaction","detail":"{read_only:false; response_revision:10672; number_of_response:1; }","duration":"137.993983ms","start":"2026-03-18T13:11:44.670818Z","end":"2026-03-18T13:11:44.808812Z","steps":["trace[1267575461] 'process raft request' (duration: 136.683195ms)"],"step_count":1} 2026-03-18T13:11:44.809094160Z {"level":"info","ts":"2026-03-18T13:11:44.809007Z","caller":"traceutil/trace.go:171","msg":"trace[601903514] linearizableReadLoop","detail":"{readStateIndex:11328; appliedIndex:11325; }","duration":"136.409107ms","start":"2026-03-18T13:11:44.672573Z","end":"2026-03-18T13:11:44.808982Z","steps":["trace[601903514] 'read index received' (duration: 27.304208ms)","trace[601903514] 'applied index is now lower than readState.Index' (duration: 109.103179ms)"],"step_count":2} 2026-03-18T13:11:44.809094160Z {"level":"info","ts":"2026-03-18T13:11:44.809051Z","caller":"traceutil/trace.go:171","msg":"trace[1059260960] transaction","detail":"{read_only:false; response_revision:10673; number_of_response:1; }","duration":"138.164748ms","start":"2026-03-18T13:11:44.670868Z","end":"2026-03-18T13:11:44.809033Z","steps":["trace[1059260960] 'process raft request' (duration: 137.89317ms)"],"step_count":1} 2026-03-18T13:11:44.809312037Z {"level":"info","ts":"2026-03-18T13:11:44.809250Z","caller":"traceutil/trace.go:171","msg":"trace[832250610] range","detail":"{range_begin:/kubernetes.io/config.openshift.io/clusteroperators/operator-lifecycle-manager-packageserver; range_end:; response_count:1; response_revision:10674; }","duration":"130.224208ms","start":"2026-03-18T13:11:44.679013Z","end":"2026-03-18T13:11:44.809237Z","steps":["trace[832250610] 'agreement among raft nodes before linearized reading' (duration: 130.176927ms)"],"step_count":1} 2026-03-18T13:11:44.809405849Z {"level":"info","ts":"2026-03-18T13:11:44.809318Z","caller":"traceutil/trace.go:171","msg":"trace[459552328] range","detail":"{range_begin:/kubernetes.io/machineconfiguration.openshift.io/machineconfigs; range_end:; response_count:0; response_revision:10674; }","duration":"109.421348ms","start":"2026-03-18T13:11:44.699872Z","end":"2026-03-18T13:11:44.809293Z","steps":["trace[459552328] 'agreement among raft nodes before linearized reading' (duration: 109.374107ms)"],"step_count":1} 2026-03-18T13:11:44.809515672Z {"level":"info","ts":"2026-03-18T13:11:44.809472Z","caller":"traceutil/trace.go:171","msg":"trace[1438131000] range","detail":"{range_begin:/kubernetes.io/monitoring.coreos.com/prometheusrules/openshift-kube-apiserver/kube-apiserver-recording-rules; range_end:; response_count:0; response_revision:10674; }","duration":"122.216027ms","start":"2026-03-18T13:11:44.687230Z","end":"2026-03-18T13:11:44.809446Z","steps":["trace[1438131000] 'agreement among raft nodes before linearized reading' (duration: 122.196167ms)"],"step_count":1} 2026-03-18T13:11:44.809719098Z {"level":"info","ts":"2026-03-18T13:11:44.809668Z","caller":"traceutil/trace.go:171","msg":"trace[744108207] range","detail":"{range_begin:/kubernetes.io/pods/openshift-etcd/etcd-master-0; range_end:; response_count:1; response_revision:10674; }","duration":"128.298974ms","start":"2026-03-18T13:11:44.681361Z","end":"2026-03-18T13:11:44.809660Z","steps":["trace[744108207] 'agreement among raft nodes before linearized reading' (duration: 128.267313ms)"],"step_count":1} 2026-03-18T13:11:44.809820501Z {"level":"info","ts":"2026-03-18T13:11:44.809776Z","caller":"traceutil/trace.go:171","msg":"trace[1597535607] range","detail":"{range_begin:/kubernetes.io/operators.coreos.com/operatorgroups; range_end:; response_count:0; response_revision:10673; }","duration":"137.221641ms","start":"2026-03-18T13:11:44.672545Z","end":"2026-03-18T13:11:44.809766Z","steps":["trace[1597535607] 'agreement among raft nodes before linearized reading' (duration: 136.599783ms)"],"step_count":1} config/pod/openshift-etcd/logs/etcd-master-0/setup_current.log0000640000000000000000000000013715156522230023123 0ustar00000000000000002026-03-18T13:09:34.084903800Z Fixing etcd log permissions.Fixing etcd auto backup permissions.config/pod/openshift-oauth-apiserver/logs/apiserver-7d95bbc4f4-4ch22/oauth-apiserver_current.log0000640000000000000000000011202615156522230031227 0ustar00000000000000002026-03-18T13:09:55.151081044Z E0318 13:09:55.148365 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.151081044Z E0318 13:09:55.148534 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.151081044Z E0318 13:09:55.148700 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.151081044Z E0318 13:09:55.148891 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.151081044Z E0318 13:09:55.149082 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.151081044Z E0318 13:09:55.149361 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.151081044Z E0318 13:09:55.149435 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.152707750Z http2: server: error reading preface from client 10.128.0.2:58832: read tcp 10.128.0.33:8443->10.128.0.2:58832: read: connection reset by peer 2026-03-18T13:09:55.236063744Z E0318 13:09:55.235968 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.244880011Z E0318 13:09:55.244803 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.245154059Z E0318 13:09:55.245096 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:09:55.256311311Z E0318 13:09:55.256239 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:00.126522229Z W0318 13:10:00.126444 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:02.077977434Z W0318 13:10:02.077902 1 logging.go:55] [core] [Channel #31 SubChannel #32]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:02.516141115Z W0318 13:10:02.516069 1 logging.go:55] [core] [Channel #10 SubChannel #11]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:02.540701613Z W0318 13:10:02.540627 1 logging.go:55] [core] [Channel #28 SubChannel #29]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:02.744147781Z W0318 13:10:02.744031 1 logging.go:55] [core] [Channel #25 SubChannel #26]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:03.404751691Z W0318 13:10:03.404657 1 logging.go:55] [core] [Channel #34 SubChannel #35]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:04.955347345Z W0318 13:10:04.955287 1 logging.go:55] [core] [Channel #2 SubChannel #4]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:05.776832313Z W0318 13:10:05.776760 1 logging.go:55] [core] [Channel #22 SubChannel #23]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:06.663444824Z W0318 13:10:06.663382 1 logging.go:55] [core] [Channel #13 SubChannel #16]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:08.119907083Z W0318 13:10:08.119809 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:15.918811859Z W0318 13:10:15.918699 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:16.920627397Z W0318 13:10:16.920574 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:18.633722217Z W0318 13:10:18.633639 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:20.203469807Z E0318 13:10:20.203416 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:20.203522249Z E0318 13:10:20.203490 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:20.203703064Z E0318 13:10:20.203416 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:20.203849468Z E0318 13:10:20.203809 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:20.204264680Z E0318 13:10:20.203809 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:20.210530077Z E0318 13:10:20.210506 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:20.210582389Z E0318 13:10:20.210570 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:20.210653961Z E0318 13:10:20.210625 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:20.210746023Z E0318 13:10:20.210715 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:20.210836476Z E0318 13:10:20.210715 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:20.736784758Z W0318 13:10:20.736671 1 logging.go:55] [core] [Channel #39 SubChannel #40]grpc: addrConn.createTransport failed to connect to {Addr: "192.168.32.10:2379", ServerName: "192.168.32.10:2379", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 192.168.32.10:2379: connect: connection refused" 2026-03-18T13:10:25.144284447Z E0318 13:10:25.144207 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.144381290Z E0318 13:10:25.144339 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.144475433Z E0318 13:10:25.144446 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.144577316Z E0318 13:10:25.144557 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.144609467Z E0318 13:10:25.144207 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.144756651Z E0318 13:10:25.144346 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.144878874Z E0318 13:10:25.144846 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.144961847Z E0318 13:10:25.144915 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.145117611Z E0318 13:10:25.145090 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:25.145117611Z E0318 13:10:25.144921 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:50.207217695Z E0318 13:10:50.207111 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:50.207217695Z E0318 13:10:50.207181 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:50.207280936Z E0318 13:10:50.207200 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:50.207280936Z E0318 13:10:50.207118 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:50.207580985Z E0318 13:10:50.207473 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:50.251675053Z E0318 13:10:50.220619 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:50.251675053Z E0318 13:10:50.221318 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:50.251675053Z E0318 13:10:50.221330 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:50.251675053Z E0318 13:10:50.221613 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:50.251675053Z E0318 13:10:50.221735 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.180095765Z E0318 13:10:55.175525 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.180095765Z E0318 13:10:55.175930 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.180095765Z E0318 13:10:55.176167 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.180095765Z E0318 13:10:55.176368 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.180095765Z E0318 13:10:55.176550 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.180095765Z E0318 13:10:55.176700 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.180095765Z E0318 13:10:55.176868 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.180095765Z E0318 13:10:55.176992 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.180095765Z E0318 13:10:55.177268 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.180095765Z E0318 13:10:55.177391 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.214385496Z E0318 13:10:55.214331 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.234838776Z E0318 13:10:55.234800 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.234924988Z E0318 13:10:55.234892 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.243638565Z E0318 13:10:55.243586 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.400986934Z E0318 13:10:55.399608 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.436382427Z E0318 13:10:55.436169 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.446012090Z E0318 13:10:55.445392 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:10:55.455215351Z E0318 13:10:55.455146 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.217632382Z E0318 13:11:20.217572 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.217750406Z E0318 13:11:20.217725 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.218189918Z E0318 13:11:20.218170 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.218282291Z E0318 13:11:20.217572 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.218395654Z E0318 13:11:20.217668 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.226238321Z E0318 13:11:20.226209 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.226326183Z E0318 13:11:20.226299 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.226373385Z E0318 13:11:20.226340 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.226373385Z E0318 13:11:20.226353 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:20.226397125Z E0318 13:11:20.226379 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.160339512Z E0318 13:11:25.160267 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.160650501Z E0318 13:11:25.160620 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.160972140Z E0318 13:11:25.160866 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.160972140Z E0318 13:11:25.160909 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.160972140Z E0318 13:11:25.160955 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.164597325Z E0318 13:11:25.164137 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:25.164597325Z E0318 13:11:25.164169 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:26.167017797Z E0318 13:11:26.165815 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:26.167017797Z E0318 13:11:26.166271 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:26.167017797Z E0318 13:11:26.166469 1 authentication.go:73] "Unable to authenticate the request" err="[x509: certificate signed by unknown authority, verifying certificate SN=2686680825602787632, SKID=93:11:C5:48:FC:AD:60:75:3D:6F:2D:3F:91:07:B3:D4:FA:D2:8E:E6, AKID=40:F1:BE:51:CA:20:7C:21:37:9B:EC:22:93:D2:F2:85:04:89:F5:02 failed: x509: certificate signed by unknown authority]" 2026-03-18T13:11:30.770541858Z I0318 13:11:30.770480 1 policy_source.go:224] refreshing policies 2026-03-18T13:11:32.772269353Z I0318 13:11:32.772209 1 policy_source.go:224] refreshing policies 2026-03-18T13:11:41.788126205Z I0318 13:11:41.788055 1 policy_source.go:224] refreshing policies 2026-03-18T13:11:42.796614714Z I0318 13:11:42.796530 1 policy_source.go:224] refreshing policies 2026-03-18T13:11:42.810594407Z I0318 13:11:42.810003 1 policy_source.go:419] informer started for config.openshift.io/v1, Kind=Infrastructure 2026-03-18T13:11:42.816581540Z I0318 13:11:42.816484 1 reflector.go:368] Caches populated for config.openshift.io/v1, Resource=infrastructures from k8s.io/client-go@v0.31.1/tools/cache/reflector.go:243 config/pod/openshift-ingress/router-default-7dcf5569b5-mtnzv.json0000640000000000000000000001534115156522230023355 0ustar0000000000000000{"metadata":{"name":"router-default-7dcf5569b5-mtnzv","generateName":"router-default-7dcf5569b5-","namespace":"openshift-ingress","uid":"ab9ef7c0-f9f2-4048-9857-06ab48f36ecf","resourceVersion":"6712","creationTimestamp":"2026-03-18T13:08:48Z","labels":{"ingresscontroller.operator.openshift.io/deployment-ingresscontroller":"default","ingresscontroller.operator.openshift.io/hash":"677444c44b","pod-template-hash":"7dcf5569b5"},"annotations":{"openshift.io/required-scc":"hostnetwork","openshift.io/scc":"hostnetwork"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"router-default-7dcf5569b5","uid":"5b4c2d4a-8770-4c04-88a4-f74f72db8903","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"default-certificate","secret":{"secretName":"router-certs-default","defaultMode":420}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","items":[{"key":"service-ca.crt","path":"service-ca.crt"}],"defaultMode":420,"optional":false}},{"name":"stats-auth","secret":{"secretName":"router-stats-default","defaultMode":420}},{"name":"metrics-certs","secret":{"secretName":"router-metrics-certs-default","defaultMode":420}},{"name":"kube-api-access-w6bfw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"router","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777","ports":[{"name":"http","hostPort":80,"containerPort":80,"protocol":"TCP"},{"name":"https","hostPort":443,"containerPort":443,"protocol":"TCP"},{"name":"metrics","hostPort":1936,"containerPort":1936,"protocol":"TCP"}],"env":[{"name":"DEFAULT_CERTIFICATE_DIR","value":"/etc/pki/tls/private"},{"name":"DEFAULT_DESTINATION_CA_PATH","value":"/var/run/configmaps/service-ca/service-ca.crt"},{"name":"RELOAD_INTERVAL","value":"5s"},{"name":"ROUTER_ALLOW_WILDCARD_ROUTES","value":"false"},{"name":"ROUTER_CANONICAL_HOSTNAME","value":"router-default.apps.sno.openstack.lab"},{"name":"ROUTER_CIPHERS","value":"ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384"},{"name":"ROUTER_CIPHERSUITES","value":"TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256"},{"name":"ROUTER_DISABLE_HTTP2","value":"true"},{"name":"ROUTER_DISABLE_NAMESPACE_OWNERSHIP_CHECK","value":"false"},{"name":"ROUTER_DOMAIN","value":"apps.sno.openstack.lab"},{"name":"ROUTER_IDLE_CLOSE_ON_RESPONSE","value":"true"},{"name":"ROUTER_LOAD_BALANCE_ALGORITHM","value":"random"},{"name":"ROUTER_METRICS_TLS_CERT_FILE","value":"/etc/pki/tls/metrics-certs/tls.crt"},{"name":"ROUTER_METRICS_TLS_KEY_FILE","value":"/etc/pki/tls/metrics-certs/tls.key"},{"name":"ROUTER_METRICS_TYPE","value":"haproxy"},{"name":"ROUTER_SERVICE_HTTPS_PORT","value":"443"},{"name":"ROUTER_SERVICE_HTTP_PORT","value":"80"},{"name":"ROUTER_SERVICE_NAME","value":"default"},{"name":"ROUTER_SERVICE_NAMESPACE","value":"openshift-ingress"},{"name":"ROUTER_SET_FORWARDED_HEADERS","value":"append"},{"name":"ROUTER_TCP_BALANCE_SCHEME","value":"source"},{"name":"ROUTER_THREADS","value":"4"},{"name":"SSL_MIN_VERSION","value":"TLSv1.2"},{"name":"STATS_PASSWORD_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsPassword"},{"name":"STATS_PORT","value":"1936"},{"name":"STATS_USERNAME_FILE","value":"/var/lib/haproxy/conf/metrics-auth/statsUsername"}],"resources":{"requests":{"cpu":"100m","memory":"256Mi"}},"volumeMounts":[{"name":"default-certificate","readOnly":true,"mountPath":"/etc/pki/tls/private"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca"},{"name":"stats-auth","readOnly":true,"mountPath":"/var/lib/haproxy/conf/metrics-auth"},{"name":"metrics-certs","readOnly":true,"mountPath":"/etc/pki/tls/metrics-certs"},{"name":"kube-api-access-w6bfw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"/healthz","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3,"terminationGracePeriodSeconds":10},"readinessProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"startupProbe":{"httpGet":{"path":"/healthz/ready","port":1936,"host":"localhost","scheme":"HTTP"},"timeoutSeconds":1,"periodSeconds":1,"successThreshold":1,"failureThreshold":120},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000660000,"runAsNonRoot":true,"readOnlyRootFilesystem":false,"allowPrivilegeEscalation":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":3600,"dnsPolicy":"ClusterFirstWithHostNet","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"router","serviceAccount":"router","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c26,c5"},"supplementalGroups":[1000660000],"fsGroup":1000660000},"schedulerName":"default-scheduler","tolerations":[{"key":"kubernetes.io/e2e-evict-taint-key","operator":"Equal","value":"evictTaintVal","effect":"NoExecute"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority","topologySpreadConstraints":[{"maxSkew":1,"topologyKey":"topology.kubernetes.io/zone","whenUnsatisfiable":"ScheduleAnyway","labelSelector":{"matchExpressions":[{"key":"ingresscontroller.operator.openshift.io/hash","operator":"In","values":["677444c44b"]}]}}]},"status":{"phase":"Pending","conditions":[{"type":"PodScheduled","status":"False","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:48Z","reason":"Unschedulable","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling."}],"qosClass":"Burstable"}}authentication-operator_current.log0000640000000000000000000003427615156522230037442 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-mqh5c2026-03-18T13:10:25.473414824Z Copying system trust bundle 2026-03-18T13:10:25.528468634Z W0318 13:10:25.528325 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory 2026-03-18T13:10:25.528755542Z I0318 13:10:25.528736 1 observer_polling.go:159] Starting file observer 2026-03-18T13:10:25.532224170Z I0318 13:10:25.529752 1 cmd.go:253] Using service-serving-cert provided certificates 2026-03-18T13:10:25.532224170Z I0318 13:10:25.529786 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. 2026-03-18T13:10:25.532224170Z I0318 13:10:25.531982 1 observer_polling.go:159] Starting file observer 2026-03-18T13:10:35.323860479Z I0318 13:10:35.323789 1 builder.go:304] cluster-authentication-operator version - 2026-03-18T13:10:35.324624760Z I0318 13:10:35.324575 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:10:35.945391820Z I0318 13:10:35.945344 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController 2026-03-18T13:10:35.950361491Z I0318 13:10:35.950296 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 2026-03-18T13:10:35.950361491Z I0318 13:10:35.950325 1 maxinflight.go:145] "Initialized mutatingChan" len=200 2026-03-18T13:10:35.950389942Z I0318 13:10:35.950356 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 2026-03-18T13:10:35.950389942Z I0318 13:10:35.950365 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 2026-03-18T13:10:35.955877377Z I0318 13:10:35.954371 1 secure_serving.go:57] Forcing use of http/1.1 only 2026-03-18T13:10:35.955877377Z W0318 13:10:35.954391 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:10:35.955877377Z W0318 13:10:35.954396 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. 2026-03-18T13:10:35.955877377Z W0318 13:10:35.954401 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. 2026-03-18T13:10:35.955877377Z I0318 13:10:35.954437 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete 2026-03-18T13:10:35.955877377Z W0318 13:10:35.954474 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. 2026-03-18T13:10:35.955877377Z W0318 13:10:35.954482 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. 2026-03-18T13:10:35.955877377Z W0318 13:10:35.954494 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. 2026-03-18T13:10:35.958433590Z I0318 13:10:35.958074 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology 2026-03-18T13:10:35.958433590Z I0318 13:10:35.958331 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock... 2026-03-18T13:10:35.969358219Z I0318 13:10:35.967738 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController 2026-03-18T13:10:35.969358219Z I0318 13:10:35.967764 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:10:35.969358219Z I0318 13:10:35.967798 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:10:35.969358219Z I0318 13:10:35.967799 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController 2026-03-18T13:10:35.969358219Z I0318 13:10:35.967987 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773839299\" (2026-03-18 13:08:21 +0000 UTC to 2028-03-17 13:08:22 +0000 UTC (now=2026-03-18 13:10:35.96795256 +0000 UTC))" 2026-03-18T13:10:35.969358219Z I0318 13:10:35.967999 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:10:35.969358219Z I0318 13:10:35.968034 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false 2026-03-18T13:10:35.969358219Z I0318 13:10:35.968053 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false 2026-03-18T13:10:35.969358219Z I0318 13:10:35.968133 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839435\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839435\" (2026-03-18 12:10:35 +0000 UTC to 2027-03-18 12:10:35 +0000 UTC (now=2026-03-18 13:10:35.968113884 +0000 UTC))" 2026-03-18T13:10:35.969358219Z I0318 13:10:35.968150 1 secure_serving.go:213] Serving securely on [::]:8443 2026-03-18T13:10:35.969358219Z I0318 13:10:35.968172 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated 2026-03-18T13:10:35.969358219Z I0318 13:10:35.968191 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" 2026-03-18T13:10:35.969358219Z I0318 13:10:35.968310 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" 2026-03-18T13:10:35.969358219Z I0318 13:10:35.968037 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:35.975043040Z I0318 13:10:35.974988 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175 2026-03-18T13:10:35.975773091Z I0318 13:10:35.975750 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-18T13:10:35.976231054Z I0318 13:10:35.975852 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209 2026-03-18T13:10:36.068443447Z I0318 13:10:36.068374 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController 2026-03-18T13:10:36.068557020Z I0318 13:10:36.068513 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file 2026-03-18T13:10:36.068628652Z I0318 13:10:36.068445 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file 2026-03-18T13:10:36.068921911Z I0318 13:10:36.068888 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:50:10 +0000 UTC to 2036-03-15 12:50:10 +0000 UTC (now=2026-03-18 13:10:36.068860009 +0000 UTC))" 2026-03-18T13:10:36.068921911Z I0318 13:10:36.068912 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2026-03-19 12:57:27 +0000 UTC (now=2026-03-18 13:10:36.0689005 +0000 UTC))" 2026-03-18T13:10:36.068975842Z I0318 13:10:36.068947 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2027-03-18 12:57:27 +0000 UTC (now=2026-03-18 13:10:36.06891726 +0000 UTC))" 2026-03-18T13:10:36.068975842Z I0318 13:10:36.068969 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2027-03-18 12:57:27 +0000 UTC (now=2026-03-18 13:10:36.068961442 +0000 UTC))" 2026-03-18T13:10:36.068990452Z I0318 13:10:36.068980 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:57:25 +0000 UTC to 2036-03-15 12:57:25 +0000 UTC (now=2026-03-18 13:10:36.068973082 +0000 UTC))" 2026-03-18T13:10:36.069170538Z I0318 13:10:36.069136 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773839299\" (2026-03-18 13:08:21 +0000 UTC to 2028-03-17 13:08:22 +0000 UTC (now=2026-03-18 13:10:36.069120776 +0000 UTC))" 2026-03-18T13:10:36.069301581Z I0318 13:10:36.069244 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839435\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839435\" (2026-03-18 12:10:35 +0000 UTC to 2027-03-18 12:10:35 +0000 UTC (now=2026-03-18 13:10:36.069232219 +0000 UTC))" 2026-03-18T13:10:36.069385674Z I0318 13:10:36.069362 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:50:10 +0000 UTC to 2036-03-15 12:50:10 +0000 UTC (now=2026-03-18 13:10:36.069348663 +0000 UTC))" 2026-03-18T13:10:36.069396614Z I0318 13:10:36.069384 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2026-03-19 12:57:27 +0000 UTC (now=2026-03-18 13:10:36.069376353 +0000 UTC))" 2026-03-18T13:10:36.069412864Z I0318 13:10:36.069406 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2027-03-18 12:57:27 +0000 UTC (now=2026-03-18 13:10:36.069388974 +0000 UTC))" 2026-03-18T13:10:36.069493797Z I0318 13:10:36.069423 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-18 12:57:27 +0000 UTC to 2027-03-18 12:57:27 +0000 UTC (now=2026-03-18 13:10:36.069411604 +0000 UTC))" 2026-03-18T13:10:36.069493797Z I0318 13:10:36.069439 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2026-03-18 12:57:25 +0000 UTC to 2036-03-15 12:57:25 +0000 UTC (now=2026-03-18 13:10:36.069431125 +0000 UTC))" 2026-03-18T13:10:36.069493797Z I0318 13:10:36.069457 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-18 12:57:25 +0000 UTC to 2026-03-19 12:57:25 +0000 UTC (now=2026-03-18 13:10:36.069444015 +0000 UTC))" 2026-03-18T13:10:36.069587699Z I0318 13:10:36.069569 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1773839299\" (2026-03-18 13:08:21 +0000 UTC to 2028-03-17 13:08:22 +0000 UTC (now=2026-03-18 13:10:36.069556299 +0000 UTC))" 2026-03-18T13:10:36.069677632Z I0318 13:10:36.069661 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773839435\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773839435\" (2026-03-18 12:10:35 +0000 UTC to 2027-03-18 12:10:35 +0000 UTC (now=2026-03-18 13:10:36.069651911 +0000 UTC))" authentication-operator_previous.log0000640000000000000000000004025615156522230037627 0ustar0000000000000000config/pod/openshift-authentication-operator/logs/authentication-operator-5885bfd7f4-mqh5c2026-03-18T13:09:29.349273331Z I0318 13:09:29.349255 1 base_controller.go:181] Shutting down oauth-server ... 2026-03-18T13:09:29.349273331Z I0318 13:09:29.349267 1 base_controller.go:181] Shutting down WebhookAuthenticatorCertApprover_OpenShiftAuthenticator ... 2026-03-18T13:09:29.349281751Z I0318 13:09:29.349274 1 base_controller.go:181] Shutting down OpenShiftAuthenticatorCertRequester ... 2026-03-18T13:09:29.349281751Z I0318 13:09:29.349278 1 base_controller.go:181] Shutting down openshift-apiserver-APIService ... 2026-03-18T13:09:29.349289971Z I0318 13:09:29.349279 1 base_controller.go:181] Shutting down auditPolicyController ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349298 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349314 1 base_controller.go:181] Shutting down openshift-authentication-IngressNodesAvailable ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349324 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionCondition ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349333 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionKey ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349342 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionMigration ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349351 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionPrune ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349359 1 base_controller.go:181] Shutting down openshift-oauth-apiserver-EncryptionState ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349367 1 base_controller.go:181] Shutting down openshift-authentication-RemoveStaleConditions ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349380 1 base_controller.go:181] Shutting down RouterCertsDomainValidationController ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349389 1 base_controller.go:181] Shutting down ConfigObserver ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349400 1 base_controller.go:181] Shutting down TrustDistributionController ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349420 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointAccessibleController controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349434 1 base_controller.go:113] All OAuthServerServiceEndpointAccessibleController workers have been terminated 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349446 1 base_controller.go:123] Shutting down worker of oauth-server controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349451 1 base_controller.go:113] All oauth-server workers have been terminated 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349516 1 base_controller.go:123] Shutting down worker of RevisionController controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349540 1 base_controller.go:123] Shutting down worker of OAuthAPIServerController-WorkloadWorkloadController controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349547 1 base_controller.go:123] Shutting down worker of openshift-authentication-RemoveStaleConditions controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349556 1 base_controller.go:113] All OAuthAPIServerController-WorkloadWorkloadController workers have been terminated 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349556 1 base_controller.go:113] All openshift-authentication-RemoveStaleConditions workers have been terminated 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349564 1 base_controller.go:123] Shutting down worker of SecretRevisionPruneController controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349547 1 base_controller.go:113] All RevisionController workers have been terminated 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349572 1 base_controller.go:123] Shutting down worker of OAuthServerServiceEndpointsEndpointAccessibleController controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349584 1 base_controller.go:123] Shutting down worker of OpenShiftAuthenticatorCertRequester controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349522 1 genericapiserver.go:546] "[graceful-termination] shutdown event" name="ShutdownInitiated" 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349591 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349594 1 base_controller.go:113] All OpenShiftAuthenticatorCertRequester workers have been terminated 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349598 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349601 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionPrune controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349609 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressNodesAvailable controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349609 1 genericapiserver.go:549] "[graceful-termination] shutdown event" name="AfterShutdownDelayDuration" 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349618 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionState controller ... 2026-03-18T13:09:29.349631621Z I0318 13:09:29.349624 1 base_controller.go:123] Shutting down worker of ConfigObserver controller ... 2026-03-18T13:09:29.349660991Z I0318 13:09:29.349627 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionKey controller ... 2026-03-18T13:09:29.349660991Z I0318 13:09:29.349631 1 base_controller.go:113] All ConfigObserver workers have been terminated 2026-03-18T13:09:29.349660991Z I0318 13:09:29.349634 1 base_controller.go:123] Shutting down worker of TrustDistributionController controller ... 2026-03-18T13:09:29.349660991Z I0318 13:09:29.349637 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionKey workers have been terminated 2026-03-18T13:09:29.349660991Z I0318 13:09:29.349640 1 base_controller.go:123] Shutting down worker of RouterCertsDomainValidationController controller ... 2026-03-18T13:09:29.349660991Z I0318 13:09:29.349636 1 genericapiserver.go:615] "[graceful-termination] shutdown event" name="NotAcceptingNewRequest" 2026-03-18T13:09:29.349660991Z I0318 13:09:29.349647 1 base_controller.go:113] All RouterCertsDomainValidationController workers have been terminated 2026-03-18T13:09:29.349660991Z I0318 13:09:29.349629 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionState workers have been terminated 2026-03-18T13:09:29.349660991Z I0318 13:09:29.349577 1 base_controller.go:113] All SecretRevisionPruneController workers have been terminated 2026-03-18T13:09:29.349660991Z I0318 13:09:29.349611 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionPrune workers have been terminated 2026-03-18T13:09:29.349677922Z I0318 13:09:29.349620 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionCondition controller ... 2026-03-18T13:09:29.349677922Z I0318 13:09:29.349665 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionCondition workers have been terminated 2026-03-18T13:09:29.349677922Z I0318 13:09:29.349553 1 base_controller.go:123] Shutting down worker of openshift-authentication-ServiceCA controller ... 2026-03-18T13:09:29.349677922Z I0318 13:09:29.349674 1 base_controller.go:113] All openshift-authentication-ServiceCA workers have been terminated 2026-03-18T13:09:29.349688622Z I0318 13:09:29.349616 1 base_controller.go:113] All openshift-authentication-IngressNodesAvailable workers have been terminated 2026-03-18T13:09:29.349688622Z I0318 13:09:29.349564 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorController controller ... 2026-03-18T13:09:29.349697502Z I0318 13:09:29.349689 1 base_controller.go:113] All WebhookAuthenticatorController workers have been terminated 2026-03-18T13:09:29.349706163Z I0318 13:09:29.349698 1 base_controller.go:123] Shutting down worker of NamespaceFinalizerController_openshift-oauth-apiserver controller ... 2026-03-18T13:09:29.349715033Z I0318 13:09:29.349707 1 base_controller.go:113] All NamespaceFinalizerController_openshift-oauth-apiserver workers have been terminated 2026-03-18T13:09:29.349715033Z I0318 13:09:29.349711 1 genericapiserver.go:640] [graceful-termination] in-flight non long-running request(s) have drained 2026-03-18T13:09:29.349755504Z I0318 13:09:29.349728 1 object_count_tracker.go:151] "StorageObjectCountTracker pruner is exiting" 2026-03-18T13:09:29.349766854Z I0318 13:09:29.349755 1 tlsconfig.go:258] "Shutting down DynamicServingCertificateController" 2026-03-18T13:09:29.349877198Z I0318 13:09:29.349850 1 secure_serving.go:258] Stopped listening on [::]:8443 2026-03-18T13:09:29.349890918Z I0318 13:09:29.349872 1 genericapiserver.go:598] "[graceful-termination] shutdown event" name="HTTPServerStoppedListening" 2026-03-18T13:09:29.349924849Z I0318 13:09:29.349898 1 base_controller.go:123] Shutting down worker of openshift-authentication-IngressState controller ... 2026-03-18T13:09:29.349924849Z I0318 13:09:29.349916 1 base_controller.go:113] All openshift-authentication-IngressState workers have been terminated 2026-03-18T13:09:29.349956830Z I0318 13:09:29.349928 1 base_controller.go:123] Shutting down worker of authentication-ManagementState controller ... 2026-03-18T13:09:29.349970740Z I0318 13:09:29.349954 1 base_controller.go:113] All authentication-ManagementState workers have been terminated 2026-03-18T13:09:29.349982220Z I0318 13:09:29.349974 1 base_controller.go:123] Shutting down worker of LoggingSyncer controller ... 2026-03-18T13:09:29.349991161Z I0318 13:09:29.349981 1 base_controller.go:113] All LoggingSyncer workers have been terminated 2026-03-18T13:09:29.350001291Z I0318 13:09:29.349989 1 base_controller.go:123] Shutting down worker of openshift-authentication-UnsupportedConfigOverrides controller ... 2026-03-18T13:09:29.350001291Z I0318 13:09:29.349997 1 base_controller.go:113] All openshift-authentication-UnsupportedConfigOverrides workers have been terminated 2026-03-18T13:09:29.350010751Z I0318 13:09:29.349700 1 genericapiserver.go:649] "[graceful-termination] not going to wait for active watch request(s) to drain" 2026-03-18T13:09:29.350055733Z I0318 13:09:29.350030 1 genericapiserver.go:681] "[graceful-termination] shutdown event" name="InFlightRequestsDrained" 2026-03-18T13:09:29.350055733Z I0318 13:09:29.349642 1 base_controller.go:113] All TrustDistributionController workers have been terminated 2026-03-18T13:09:29.350055733Z E0318 13:09:29.349591 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: the operator is shutting down, skipping updating conditions, err = failed to reconcile enabled APIs: [Get \"https://172.30.0.1:443/apis/apiregistration.k8s.io/v1/apiservices/v1.oauth.openshift.io\": context canceled, client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350080 1 dynamic_serving_content.go:149] "Shutting down controller" name="serving-cert::/tmp/serving-cert-2839311465/tls.crt::/tmp/serving-cert-2839311465/tls.key" 2026-03-18T13:09:29.351083101Z I0318 13:09:29.349583 1 base_controller.go:123] Shutting down worker of openshift-oauth-apiserver-EncryptionMigration controller ... 2026-03-18T13:09:29.351083101Z I0318 13:09:29.349586 1 base_controller.go:113] All OAuthServerServiceEndpointsEndpointAccessibleController workers have been terminated 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350108 1 base_controller.go:113] All openshift-oauth-apiserver-EncryptionMigration workers have been terminated 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350126 1 base_controller.go:123] Shutting down worker of APIServerStaticResources-StaticResources controller ... 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350135 1 base_controller.go:113] All APIServerStaticResources-StaticResources workers have been terminated 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350135 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350340 1 base_controller.go:123] Shutting down worker of StatusSyncer_authentication controller ... 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350343 1 builder.go:335] server exited 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350349 1 base_controller.go:113] All StatusSyncer_authentication workers have been terminated 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350359 1 base_controller.go:123] Shutting down worker of WebhookAuthenticatorCertApprover_OpenShiftAuthenticator controller ... 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350369 1 base_controller.go:113] All WebhookAuthenticatorCertApprover_OpenShiftAuthenticator workers have been terminated 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350400 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350449 1 requestheader_controller.go:186] Shutting down RequestHeaderAuthRequestController 2026-03-18T13:09:29.351083101Z I0318 13:09:29.350468 1 configmap_cafile_content.go:226] "Shutting down controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" 2026-03-18T13:09:29.351186584Z I0318 13:09:29.351108 1 base_controller.go:123] Shutting down worker of openshift-apiserver-APIService controller ... 2026-03-18T13:09:29.351186584Z I0318 13:09:29.351126 1 base_controller.go:113] All openshift-apiserver-APIService workers have been terminated 2026-03-18T13:09:29.351826802Z E0318 13:09:29.351769 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": client rate limiter Wait returned an error: context canceled" 2026-03-18T13:09:29.352233884Z E0318 13:09:29.352044 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": context canceled, \"oauth-openshift/oauth-service.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_role.yaml\" (string): client rate limiter Wait returned an error: context canceled, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): client rate limiter Wait returned an error: context canceled, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": client rate limiter Wait returned an error: context canceled]" 2026-03-18T13:09:29.352907312Z I0318 13:09:29.352861 1 base_controller.go:123] Shutting down worker of auditPolicyController controller ... 2026-03-18T13:09:29.352907312Z I0318 13:09:29.352878 1 base_controller.go:113] All auditPolicyController workers have been terminated 2026-03-18T13:09:29.353118208Z I0318 13:09:29.353079 1 base_controller.go:123] Shutting down worker of OpenshiftAuthenticationStaticResources-StaticResources controller ... 2026-03-18T13:09:29.353118208Z I0318 13:09:29.353097 1 base_controller.go:113] All OpenshiftAuthenticationStaticResources-StaticResources workers have been terminated 2026-03-18T13:09:34.349285214Z I0318 13:09:34.349191 1 observer_polling.go:162] Shutting down file observer 2026-03-18T13:10:03.353434144Z E0318 13:10:03.353336 1 leaderelection.go:322] Failed to release lock: Timeout: request did not complete within requested timeout - context deadline exceeded 2026-03-18T13:10:03.353434144Z W0318 13:10:03.353419 1 leaderelection.go:84] leader election lost config/pod/openshift-authentication-operator/authentication-operator-5885bfd7f4-mqh5c.json0000640000000000000000000001607615156522230030331 0ustar0000000000000000{"metadata":{"name":"authentication-operator-5885bfd7f4-mqh5c","generateName":"authentication-operator-5885bfd7f4-","namespace":"openshift-authentication-operator","uid":"8ce8e99d-7b02-4bf4-a438-adde851918cb","resourceVersion":"8321","creationTimestamp":"2026-03-18T13:06:17Z","labels":{"app":"authentication-operator","pod-template-hash":"5885bfd7f4"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.8/23\"],\"mac_address\":\"0a:58:0a:80:00:08\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.8/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.8\"\n ],\n \"mac\": \"0a:58:0a:80:00:08\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"anyuid","openshift.io/scc":"anyuid"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"authentication-operator-5885bfd7f4","uid":"7235791b-b9d3-4e34-ba88-24c8c241c873","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"config","configMap":{"name":"authentication-operator-config","defaultMode":440}},{"name":"trusted-ca-bundle","configMap":{"name":"trusted-ca-bundle","defaultMode":420,"optional":true}},{"name":"serving-cert","secret":{"secretName":"serving-cert","defaultMode":420,"optional":true}},{"name":"service-ca-bundle","configMap":{"name":"service-ca-bundle","defaultMode":420,"optional":true}},{"name":"kube-api-access-r8dfw","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"authentication-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","command":["/bin/bash","-ec"],"args":["if [ -s /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/run/configmaps/trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec authentication-operator operator --config=/var/run/configmaps/config/operator-config.yaml --v=2 --terminate-on-files=/var/run/configmaps/trusted-ca-bundle/ca-bundle.crt --terminate-on-files=/tmp/terminate\n"],"env":[{"name":"IMAGE_OAUTH_SERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3fdcbf7be3f90bd080ffb2c75b091d7eef03681e0f90912ff6140ee48c177616"},{"name":"IMAGE_OAUTH_APISERVER","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"OPERAND_OAUTH_SERVER_IMAGE_VERSION","value":"4.18.35_openshift"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"20m","memory":"200Mi"}},"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/trusted-ca-bundle"},{"name":"service-ca-bundle","readOnly":true,"mountPath":"/var/run/configmaps/service-ca-bundle"},{"name":"kube-api-access-r8dfw","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"livenessProbe":{"httpGet":{"path":"healthz","port":8443,"scheme":"HTTPS"},"initialDelaySeconds":30,"timeoutSeconds":1,"periodSeconds":10,"successThreshold":1,"failureThreshold":3},"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["MKNOD"]},"runAsUser":0,"readOnlyRootFilesystem":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"authentication-operator","serviceAccount":"authentication-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c16,c5"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:03Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:48Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.8","podIPs":[{"ip":"10.128.0.8"}],"startTime":"2026-03-18T13:07:48Z","containerStatuses":[{"name":"authentication-operator","state":{"running":{"startedAt":"2026-03-18T13:10:25Z"}},"lastState":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:08:03Z","finishedAt":"2026-03-18T13:10:03Z","containerID":"cri-o://f140128413a59472c05ccbf8a67ba06b17c2bdd86a6d5881d2c8c4864d65b7ae"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","containerID":"cri-o://fed27cffabccc869ac986a2ece7d1eaa066ccade65777fdb3d022f0aa2c6568c","started":true,"volumeMounts":[{"name":"config","mountPath":"/var/run/configmaps/config"},{"name":"serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"trusted-ca-bundle","mountPath":"/var/run/configmaps/trusted-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca-bundle","mountPath":"/var/run/configmaps/service-ca-bundle","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-r8dfw","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}events/openshift-operator-lifecycle-manager.json0000640000000000000000000003276615156522230020653 0ustar0000000000000000{"items":[{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:17Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:27Z","reason":"ScalingReplicaSet","message":"Scaled up replica set package-server-manager-7b95f86987 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set olm-operator-5c9796789 to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set catalog-operator-68f85b4d6c to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:30Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:30Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:02:30Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:15Z","reason":"FailedCreate","message":"Error creating: pods \"catalog-operator-68f85b4d6c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:15Z","reason":"FailedCreate","message":"Error creating: pods \"package-server-manager-7b95f86987-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:15Z","reason":"FailedCreate","message":"Error creating: pods \"olm-operator-5c9796789-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:15Z","reason":"NoPods","message":"No matching pods found","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:16Z","reason":"SuccessfulCreate","message":"Created pod: olm-operator-5c9796789-8r4hr","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:16Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:16Z","reason":"SuccessfulCreate","message":"Created pod: package-server-manager-7b95f86987-kbpvr","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:16Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:17Z","reason":"SuccessfulCreate","message":"Created pod: catalog-operator-68f85b4d6c-p9k56","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:06:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/package-server-manager-7b95f86987-kbpvr to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/olm-operator-5c9796789-8r4hr to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/catalog-operator-68f85b4d6c-p9k56 to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:05Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"package-server-manager-serving-cert\" : secret \"package-server-manager-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"catalog-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:28Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"srv-cert\" : secret \"olm-operator-serving-cert\" not found","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.24/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.12/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.11/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Created","message":"Created container: kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Started","message":"Started container kube-rbac-proxy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\"","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:02Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 15.298s (15.298s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:02Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 15.88s (15.88s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:02Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" in 15.941s (15.941s including waiting). Image size: 862657321 bytes.","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Created","message":"Created container: package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Started","message":"Started container package-server-manager","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Started","message":"Started container olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Created","message":"Created container: catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Created","message":"Created container: olm-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Started","message":"Started container catalog-operator","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:04Z","reason":"LeaderElection","message":"package-server-manager-7b95f86987-kbpvr_ff25a09a-7f57-4aff-b0d7-b6ca2f6dda03 became leader","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:04Z","reason":"RequirementsUnknown","message":"requirements not yet checked","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:05Z","reason":"ScalingReplicaSet","message":"Scaled up replica set packageserver-5dccbdd8cc to 1","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:05Z","reason":"SuccessfulCreate","message":"Created pod: packageserver-5dccbdd8cc-pw7vm","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:05Z","reason":"AllRequirementsMet","message":"all requirements found, attempting install","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:05Z","reason":"Scheduled","message":"Successfully assigned openshift-operator-lifecycle-manager/packageserver-5dccbdd8cc-pw7vm to master-0","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:06Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578\" already present on machine","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:06Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.53/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:06Z","reason":"InstallWaiting","message":"apiServices not installed","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:06Z","reason":"InstallSucceeded","message":"waiting for install components to report healthy","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:07Z","reason":"Started","message":"Started container packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:07Z","reason":"Created","message":"Created container: packageserver","type":"Normal"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:08Z","reason":"ProbeError","message":"Readiness probe error: Get \"https://10.128.0.53:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)\nbody: \n","type":"Warning"},{"namespace":"openshift-operator-lifecycle-manager","lastTimestamp":"2026-03-18T13:09:08Z","reason":"Unhealthy","message":"Readiness probe failed: Get \"https://10.128.0.53:5443/healthz\": net/http: request canceled while waiting for connection (Client.Timeout exceeded while awaiting headers)","type":"Warning"}]}events/openshift-apiserver.json0000640000000000000000000001255415156522230015444 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:39Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-6774666ccc to 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:39Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-6774666ccc-2b2qz to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:39Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-6774666ccc-2b2qz","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:43Z","reason":"SuccessfulDelete","message":"Deleted pod: apiserver-6774666ccc-2b2qz","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:43Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules. preemption: 0/1 nodes are available: 1 node(s) didn't match pod anti-affinity rules.","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:43Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-574f6d5bf6 to 1 from 0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:43Z","reason":"ScalingReplicaSet","message":"Scaled down replica set apiserver-6774666ccc to 0 from 1","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:43Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-574f6d5bf6-8krhk","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:43Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"audit\" : configmap \"audit-0\" not found","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:45Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver/apiserver-574f6d5bf6-8krhk to master-0","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:46Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\"","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:08:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.41/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:02Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" in 15.704s (15.704s including waiting). Image size: 589386806 bytes.","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:04Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:05Z","reason":"Started","message":"Started container openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:05Z","reason":"Created","message":"Created container: openshift-apiserver-check-endpoints","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:05Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:05Z","reason":"Started","message":"Started container openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:05Z","reason":"Created","message":"Created container: openshift-apiserver","type":"Normal"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:15Z","reason":"Unhealthy","message":"Startup probe failed: HTTP probe failed with statuscode: 500","type":"Warning"},{"namespace":"openshift-apiserver","lastTimestamp":"2026-03-18T13:09:15Z","reason":"ProbeError","message":"Startup probe error: HTTP probe failed with statuscode: 500\nbody: [+]ping ok\n[+]log ok\n[+]etcd ok\n[+]poststarthook/start-apiserver-admission-initializer ok\n[+]poststarthook/generic-apiserver-start-informers ok\n[+]poststarthook/max-in-flight-filter ok\n[+]poststarthook/storage-object-count-tracker-hook ok\n[+]poststarthook/image.openshift.io-apiserver-caches ok\n[-]poststarthook/authorization.openshift.io-bootstrapclusterroles failed: reason withheld\n[+]poststarthook/authorization.openshift.io-ensurenodebootstrap-sa ok\n[+]poststarthook/project.openshift.io-projectcache ok\n[+]poststarthook/project.openshift.io-projectauthorizationcache ok\n[+]poststarthook/openshift.io-startinformers ok\n[+]poststarthook/openshift.io-restmapperupdater ok\n[+]poststarthook/quota.openshift.io-clusterquotamapping ok\nlivez check failed\n\n","type":"Warning"}]}events/openshift-apiserver-operator.json0000640000000000000000000012034215156522230017270 0ustar0000000000000000{"items":[{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:02:14Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-apiserver-operator-d65958b8 to 1","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:02:24Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:06:15Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-apiserver-operator-d65958b8-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:06:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:06:17Z","reason":"SuccessfulCreate","message":"Created pod: openshift-apiserver-operator-d65958b8-lwfvl","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Scheduled","message":"Successfully assigned openshift-apiserver-operator/openshift-apiserver-operator-d65958b8-lwfvl to master-0","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.21/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:07:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:14Z","reason":"Failed","message":"Failed to pull image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\": rpc error: code = Canceled desc = copying config: context canceled","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:14Z","reason":"Failed","message":"Error: ErrImagePull","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e\" in 396ms (396ms including waiting). Image size: 512274055 bytes.","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"Created","message":"Created container: openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"Started","message":"Started container openshift-apiserver-operator","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"LeaderElection","message":"openshift-apiserver-operator-d65958b8-lwfvl_a5bdd738-88da-4a68-be2f-74d8dea8415f became leader","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"RoutingConfigSubdomainChanged","message":"Domain changed from \"\" to \"apps.sno.openstack.lab\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t},\n+ \t\"projectConfig\": map[string]any{\"projectRequestMessage\": string(\"\")},\n+ \t\"routingConfig\": map[string]any{\"subdomain\": string(\"apps.sno.openstack.lab\")},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n+ \t\"storageConfig\": map[string]any{\"urls\": []any{string(\"https://192.168.32.10:2379\")}},\n }\n","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:30Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded set to False (\"RevisionControllerDegraded: configmap \\\"audit\\\" not found\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to True (\"All is well\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [] to [{\"operator.openshift.io\" \"openshiftapiservers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-apiserver\"} {\"\" \"namespaces\" \"\" \"openshift-etcd-operator\"} {\"\" \"endpoints\" \"openshift-etcd\" \"host-etcd-2\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-apiserver\" \"\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.apps.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.authorization.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.build.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.image.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.project.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.quota.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.route.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.security.openshift.io\"} {\"apiregistration.k8s.io\" \"apiservices\" \"\" \"v1.template.openshift.io\"}],status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:31Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available changed from Unknown to False (\"APIServicesAvailable: endpoints \\\"api\\\" not found\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:33Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/etcd-serving-ca -n openshift-apiserver: namespaces \"openshift-apiserver\" not found","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:34Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:37Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/image-import-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-apiserver-sa -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/trusted-ca-bundle -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\" to \"APIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"audit\\\" not found\\nResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"ResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"ResourceSyncControllerDegraded: namespaces \\\"openshift-apiserver\\\" not found\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:39Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing changed from False to True (\"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\")","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"OperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\",Available message changed from \"APIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"DeploymentUpdated","message":"Updated Deployment.apps/apiserver -n openshift-apiserver because it changed","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\\nOperatorConfigProgressing: openshiftapiserveroperatorconfigs/instance: observed generation is 0, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:08:47Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: observed generation is 1, desired generation is 2.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:09:20Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.apps.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:09:20Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.authorization.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:09:20Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.build.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:09:20Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.image.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:09:20Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.project.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:09:54Z","reason":"\u003cunknown\u003eCreateFailed","message":"Failed to create \u003cunknown\u003e/v1.quota.openshift.io: Timeout: request did not complete within requested timeout - context deadline exceeded","type":"Warning"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"AuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:30Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.route.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:30Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.security.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:30Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.template.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:30Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: Timeout: request did not complete within requested timeout - context deadline exceeded\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:30Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.quota.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:31Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: Timeout: request did not complete within requested timeout - context deadline exceeded\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401\" to \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"AuditPolicyDegraded: the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps audit)\" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:33Z","reason":"OperatorVersionChanged","message":"clusteroperator/openshift-apiserver version \"openshift-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"openshift-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:33Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"APIServerWorkloadDegraded: \\\"image-import-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps image-import-ca)\\nAPIServerWorkloadDegraded: \",Progressing changed from True to False (\"All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerWorkloadDegraded: \\\"image-import-ca\\\": the server was unable to return a response in the time allotted, but may still be processing the request (get configmaps image-import-ca)\\nAPIServerWorkloadDegraded: \" to \"All is well\"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:10:39Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"All is well\" to \"APIServerStaticResourcesDegraded: \\\"v3.11.0/openshift-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-apiserver)\\nAPIServerStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-apiserver-operator","lastTimestamp":"2026-03-18T13:11:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/openshift-apiserver changed: Degraded message changed from \"APIServerStaticResourcesDegraded: \\\"v3.11.0/openshift-apiserver/ns.yaml\\\" (string): the server was unable to return a response in the time allotted, but may still be processing the request (get namespaces openshift-apiserver)\\nAPIServerStaticResourcesDegraded: \" to \"All is well\"","type":"Normal"}]}events/openshift-kube-scheduler-operator.json0000640000000000000000000007744515156522230020211 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:02:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set openshift-kube-scheduler-operator-dddff6458 to 1","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:02:23Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:06:16Z","reason":"FailedCreate","message":"Error creating: pods \"openshift-kube-scheduler-operator-dddff6458-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:06:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:06:18Z","reason":"SuccessfulCreate","message":"Created pod: openshift-kube-scheduler-operator-dddff6458-4bfbf","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-scheduler-operator/openshift-kube-scheduler-operator-dddff6458-4bfbf to master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.25/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:07:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:13Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:16Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" in 3.21s (3.21s including waiting). Image size: 506395599 bytes.","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-scheduler version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"LeaderElection","message":"openshift-kube-scheduler-operator-dddff6458-4bfbf_d788fea7-c1f9-4b4b-87aa-c360e1aff660 became leader","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-scheduler\" \"\"}] to [{\"operator.openshift.io\" \"kubeschedulers\" \"\" \"cluster\"} {\"config.openshift.io\" \"schedulers\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler\"} {\"\" \"namespaces\" \"\" \"openshift-kube-scheduler-operator\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded changed from Unknown to False (\"NodeControllerDegraded: All master nodes are ready\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\",Progressing changed from Unknown to False (\"NodeInstallerProgressing: 1 node is at revision 0\"),Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\")","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-scheduler because it changed","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-scheduler-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-scheduler -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler:public-2 because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:sa-listing-configmaps -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"ServiceCreated","message":"Created Service/scheduler -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/openshift-kube-scheduler-sa -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-scheduler-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:25Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:26Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:26Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:26Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:31Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:34Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0","type":"Warning"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-scheduler-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-scheduler-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"optional secret/serving-cert has been created,required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:37Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\\nTargetConfigControllerDegraded: \\\"serviceaccount/localhost-recovery-client\\\": serviceaccounts \\\"localhost-recovery-client\\\" not found\" to \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\\nInstallerControllerDegraded: missing required resources: [configmaps: config-0,kube-scheduler-cert-syncer-kubeconfig-0,kube-scheduler-pod-0,scheduler-kubeconfig-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0]\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:40Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:41Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"optional secret/serving-cert has been created,required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:41Z","reason":"StartingNewRevision","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-scheduler-pod -n openshift-kube-scheduler:\ncause by changes in data.pod.yaml","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:46Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:47Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:49Z","reason":"SecretCreated","message":"Created Secret/serving-cert-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:50Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-3 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:52Z","reason":"StartingNewRevision","message":"new revision 4 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:52Z","reason":"RevisionTriggered","message":"new revision 3 triggered by \"required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:54Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-pod-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:54Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:55Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-scheduler:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:56Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:56Z","reason":"PodCreated","message":"Created Pod/installer-3-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/scheduler-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:08:58Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-scheduler-cert-syncer-kubeconfig-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:09:00Z","reason":"SecretCreated","message":"Created Secret/serving-cert-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:09:01Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-4 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:09:02Z","reason":"RevisionTriggered","message":"new revision 4 triggered by \"required configmap/kube-scheduler-pod has changed\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:09:04Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-scheduler changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 3\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4\"","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:09:07Z","reason":"PodCreated","message":"Created Pod/installer-4-master-0 -n openshift-kube-scheduler because it was missing","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Started","message":"Started container kube-scheduler-operator-container","type":"Normal"},{"namespace":"openshift-kube-scheduler-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Created","message":"Created container: kube-scheduler-operator-container","type":"Normal"}]}events/openshift-kube-scheduler.json0000640000000000000000000000720115156522230016337 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:08:39Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"kube-api-access\" : failed to sync configmap cache: timed out waiting for the condition","type":"Warning"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:08:46Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.34/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:08:46Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:08:47Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.42/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:08:54Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:09:03Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.46/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:09:06Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:09:07Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.54/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:09:09Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:09:10Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-scheduler","lastTimestamp":"2026-03-18T13:09:11Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-controller-manager-operator.json0000640000000000000000000013632015156522230022012 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:02:13Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-controller-manager-operator-ff989d6cc to 1","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:02:23Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:06:15Z","reason":"FailedCreate","message":"Error creating: pods \"kube-controller-manager-operator-ff989d6cc-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:06:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:06:18Z","reason":"SuccessfulCreate","message":"Created pod: kube-controller-manager-operator-ff989d6cc-nqtlk","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-controller-manager-operator/kube-controller-manager-operator-ff989d6cc-nqtlk to master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.16/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:07:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:13Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:16Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" in 2.904s (2.904s including waiting). Image size: 508888171 bytes.","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:17Z","reason":"LeaderElection","message":"kube-controller-manager-operator-ff989d6cc-nqtlk_195ac99b-53f5-427f-9463-14b64f7501d7 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:17Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"\" \"nodes\" \"\" \"\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubecontrollermanagers\" \"\" \"cluster\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager\"} {\"\" \"namespaces\" \"\" \"openshift-kube-controller-manager-operator\"} {\"\" \"namespaces\" \"\" \"kube-system\"} {\"certificates.k8s.io\" \"certificatesigningrequests\" \"\" \"\"} {\"\" \"nodes\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"CABundleUpdateRequired","message":"\"csr-controller-signer-ca\" in \"openshift-kube-controller-manager-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-controller-manager version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded changed from Unknown to False (\"All is well\"),Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"All is well\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:20Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-mvd89\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:20Z","reason":"TargetUpdateRequired","message":"\"csr-signer\" in \"openshift-kube-controller-manager-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:20Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:20Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:20Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/csr-controller-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-kube-controller-manager because it changed","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-controller-manager-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-locking-kube-controller-manager -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated featureGates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated extendedArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ObserveServiceCAConfigMap","message":"observed change in config","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"extendedArguments\": map[string]any{\n+ \t\t\"cluster-cidr\": []any{string(\"10.128.0.0/16\")},\n+ \t\t\"cluster-name\": []any{string(\"sno-mvd89\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"service-cluster-ip-range\": []any{string(\"172.30.0.0/16\")},\n+ \t},\n+ \t\"featureGates\": []any{\n+ \t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"),\n+ \t\tstring(\"DisableKubeletCloudCredentialProviders=true\"),\n+ \t\tstring(\"GCPLabelsTags=true\"), string(\"HardwareSpeed=true\"),\n+ \t\tstring(\"IngressControllerLBSubnetsAWS=true\"), string(\"KMSv1=true\"),\n+ \t\tstring(\"ManagedBootImages=true\"), string(\"ManagedBootImagesAWS=true\"),\n+ \t\tstring(\"MultiArchInstallAWS=true\"), ...,\n+ \t},\n+ \t\"serviceServingCert\": map[string]any{\n+ \t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resources/configmaps/service-ca/ca-bundle.crt\"),\n+ \t},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:leader-election-lock-cluster-policy-controller -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:25Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:26Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\\nConfigObservationDegraded: error writing updated observed config: Operation cannot be fulfilled on kubecontrollermanagers.operator.openshift.io \\\"cluster\\\": the object has been modified; please apply your changes to the latest version and try again\" to \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:26Z","reason":"ServiceCreated","message":"Created Service/kube-controller-manager -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/kube-controller-manager-sa -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-controller-manager-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/pv-recycler-controller -n openshift-infra because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:32Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:33Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:33Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:34Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-signer-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:cluster-csr-approver-controller because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-kube-controller-manager-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/csr-controller-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"SecretCreated","message":"Created Secret/csr-signer -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:44Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:45Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:45Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:46Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:48Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:49Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:49Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/cluster-policy-controller-config -n openshift-kube-controller-manager:\ncause by changes in data.config.yaml","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:50Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:51Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:52Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:53Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:54Z","reason":"SecretCreated","message":"Created Secret/serving-cert-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:54Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:55Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/serviceaccount-ca -n openshift-kube-controller-manager:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:55Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"RevisionControllerDegraded: configmap \\\"kube-controller-manager-pod\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:55Z","reason":"StartingNewRevision","message":"new revision 2 triggered by \"required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:55Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0","type":"Warning"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:55Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-controller-manager-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:57Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:57Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: cluster-policy-controller-config-0,config-0,controller-manager-kubeconfig-0,kube-controller-cert-syncer-kubeconfig-0,kube-controller-manager-pod-0,recycler-config-0,service-ca-0,serviceaccount-ca-0, secrets: localhost-recovery-client-token-0,service-account-private-key-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:58Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:08:59Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-manager-pod-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:00Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/controller-manager-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:02Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-policy-controller-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"NodeControllerDegraded: All master nodes are ready\" to \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.16:35826-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Degraded message changed from \"GarbageCollectorDegraded: error fetching rules: Get \\\"https://thanos-querier.openshift-monitoring.svc:9091/api/v1/rules\\\": dial tcp: lookup thanos-querier.openshift-monitoring.svc on 172.30.0.10:53: read udp 10.128.0.16:35826-\u003e172.30.0.10:53: read: connection refused\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:03Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-controller-cert-syncer-kubeconfig-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/serviceaccount-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:07Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-ca-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:09Z","reason":"SecretCreated","message":"Created Secret/service-account-private-key-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/recycler-config-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:11Z","reason":"SecretCreated","message":"Created Secret/serving-cert-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:11Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-2 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:12Z","reason":"RevisionTriggered","message":"new revision 2 triggered by \"required configmap/cluster-policy-controller-config has changed,required configmap/serviceaccount-ca has changed\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:16Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-controller-manager changed: Progressing message changed from \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2\"","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:16Z","reason":"PodCreated","message":"Created Pod/installer-2-master-0 -n openshift-kube-controller-manager because it was missing","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:09:19Z","reason":"SATokenSignerControllerStuck","message":"unexpected addresses: 192.168.32.10","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Started","message":"Started container kube-controller-manager-operator","type":"Normal"},{"namespace":"openshift-kube-controller-manager-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Created","message":"Created container: kube-controller-manager-operator","type":"Normal"}]}events/openshift-kube-controller-manager.json0000640000000000000000000001233415156522230020157 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:09:03Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.48/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:09:04Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:09:04Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:09:15Z","reason":"Killing","message":"Stopping container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:09:31Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.57/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:10:27Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:01Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:01Z","reason":"StaticPodInstallerCompleted","message":"Successfully installed revision 2","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:02Z","reason":"Created","message":"Created container: kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:02Z","reason":"Started","message":"Started container kube-controller-manager","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:02Z","reason":"Created","message":"Created container: cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:02Z","reason":"Started","message":"Started container cluster-policy-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:02Z","reason":"Created","message":"Created container: kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:02Z","reason":"Started","message":"Started container kube-controller-manager-cert-syncer","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:03Z","reason":"LeaderElection","message":"master-0_7394c2cc-5934-4c66-87e1-bda9702c49d0 became leader","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:03Z","reason":"Created","message":"Created container: kube-controller-manager-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:03Z","reason":"Started","message":"Started container kube-controller-manager-recovery-controller","type":"Normal"},{"namespace":"openshift-kube-controller-manager","lastTimestamp":"2026-03-18T13:11:03Z","reason":"ControlPlaneTopology","message":"unable to get control plane topology, using HA cluster values for leader election: infrastructures.config.openshift.io \"cluster\" is forbidden: User \"system:kube-controller-manager\" cannot get resource \"infrastructures\" in API group \"config.openshift.io\" at the cluster scope","type":"Warning"}]}events/openshift-kube-apiserver.json0000640000000000000000000000143215156522230016361 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T13:09:03Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.45/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-kube-apiserver","lastTimestamp":"2026-03-18T13:09:03Z","reason":"Started","message":"Started container installer","type":"Normal"}]}events/openshift-kube-apiserver-operator.json0000640000000000000000000020105315156522230020213 0ustar0000000000000000{"items":[{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:02:29Z","reason":"ScalingReplicaSet","message":"Scaled up replica set kube-apiserver-operator-8b68b9d9b to 1","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:02:30Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:15Z","reason":"FailedCreate","message":"Error creating: pods \"kube-apiserver-operator-8b68b9d9b-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:06:18Z","reason":"SuccessfulCreate","message":"Created pod: kube-apiserver-operator-8b68b9d9b-5zbrg","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Scheduled","message":"Successfully assigned openshift-kube-apiserver-operator/kube-apiserver-operator-8b68b9d9b-5zbrg to master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.17/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:55Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:57Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:07:58Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:01Z","reason":"LeaderElection","message":"kube-apiserver-operator-8b68b9d9b-5zbrg_7c94e845-c875-4283-802e-4f33e8e49550 became leader","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:01Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:01Z","reason":"OperatorVersionChanged","message":"clusteroperator/kube-apiserver version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:01Z","reason":"ServiceAccountIssuer","message":"Issuer set to default value \"https://kubernetes.default.svc\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:02Z","reason":"SignerUpdateRequired","message":"\"node-system-admin-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:02Z","reason":"CABundleUpdateRequired","message":"\"loadbalancer-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:02Z","reason":"CABundleUpdateRequired","message":"\"localhost-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:02Z","reason":"CABundleUpdateRequired","message":"\"service-network-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:02Z","reason":"SignerUpdateRequired","message":"\"localhost-recovery-serving-signer\" in \"openshift-kube-apiserver-operator\" requires a new signing cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.relatedObjects changed from [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"}] to [{\"operator.openshift.io\" \"kubeapiservers\" \"\" \"cluster\"} {\"apiextensions.k8s.io\" \"customresourcedefinitions\" \"\" \"\"} {\"security.openshift.io\" \"securitycontextconstraints\" \"\" \"\"} {\"\" \"namespaces\" \"\" \"openshift-config\"} {\"\" \"namespaces\" \"\" \"openshift-config-managed\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver-operator\"} {\"\" \"namespaces\" \"\" \"openshift-kube-apiserver\"} {\"admissionregistration.k8s.io\" \"mutatingwebhookconfigurations\" \"\" \"\"} {\"admissionregistration.k8s.io\" \"validatingwebhookconfigurations\" \"\" \"\"} {\"controlplane.operator.openshift.io\" \"podnetworkconnectivitychecks\" \"openshift-kube-apiserver\" \"\"} {\"apiserver.openshift.io\" \"apirequestcounts\" \"\" \"\"} {\"config.openshift.io\" \"nodes\" \"\" \"cluster\"}],status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable changed from Unknown to True (\"All is well\"),EvaluationConditionsDetected changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:02Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/cpu-utilization -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:02Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:03Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:04Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:04Z","reason":"ObserveFeatureFlagsUpdated","message":"Updated apiServerArguments.feature-gates to AWSEFSDriverVolumeMetrics=true,AdminNetworkPolicy=true,AlibabaPlatform=true,AzureWorkloadIdentity=true,BareMetalLoadBalancer=true,BuildCSIVolumes=true,ChunkSizeMiB=true,CloudDualStackNodeIPs=true,DisableKubeletCloudCredentialProviders=true,GCPLabelsTags=true,HardwareSpeed=true,IngressControllerLBSubnetsAWS=true,KMSv1=true,ManagedBootImages=true,ManagedBootImagesAWS=true,MultiArchInstallAWS=true,MultiArchInstallGCP=true,NetworkDiagnosticsConfig=true,NetworkLiveMigration=true,NetworkSegmentation=true,NewOLM=true,NodeDisruptionPolicy=true,OnClusterBuild=true,PersistentIPsForVirtualization=true,PrivateHostedZoneAWS=true,SetEIPForNLBIngressController=true,StreamingCollectionEncodingToJSON=true,StreamingCollectionEncodingToProtobuf=true,VSphereControlPlaneMachineSet=true,VSphereDriverConfiguration=true,VSphereMultiVCenters=true,VSphereStaticIPs=true,ValidatingAdmissionPolicy=true,AWSClusterHostedDNS=false,AdditionalRoutingCapabilities=false,AutomatedEtcdBackup=false,BootcNodeManagement=false,CSIDriverSharedResource=false,ClusterAPIInstall=false,ClusterAPIInstallIBMCloud=false,ClusterMonitoringConfig=false,ConsolePluginContentSecurityPolicy=false,DNSNameResolver=false,DynamicResourceAllocation=false,EtcdBackendQuota=false,EventedPLEG=false,Example=false,ExternalOIDC=false,ExternalOIDCWithUIDAndExtraClaimMappings=false,GCPClusterHostedDNS=false,GatewayAPI=false,ImageStreamImportMode=false,IngressControllerDynamicConfigurationManager=false,InsightsConfig=false,InsightsConfigAPI=false,InsightsOnDemandDataGather=false,InsightsRuntimeExtractor=false,MachineAPIMigration=false,MachineAPIOperatorDisableMachineHealthCheckController=false,MachineAPIProviderOpenStack=false,MachineConfigNodes=false,MaxUnavailableStatefulSet=false,MetricsCollectionProfiles=false,MinimumKubeletVersion=false,MixedCPUsAllocation=false,MultiArchInstallAzure=false,NodeSwap=false,NutanixMultiSubnets=false,OVNObservability=false,OpenShiftPodSecurityAdmission=false,PinnedImages=false,PlatformOperators=false,ProcMountType=false,RouteAdvertisements=false,RouteExternalCertificate=false,ServiceAccountTokenNodeBinding=false,SignatureStores=false,SigstoreImageVerification=false,TranslateStreamCloseWebsocketRequests=false,UpgradeStatus=false,UserNamespacesPodSecurityStandards=false,UserNamespacesSupport=false,VSphereMultiNetworks=false,VolumeAttributesClass=false,VolumeGroupSnapshot=false","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:04Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379,https://localhost:2379","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:04Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-aggregator-client-ca\" in \"openshift-config-managed\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"SecretUpdated","message":"Updated Secret/aggregator-client-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"SecretUpdated","message":"Updated Secret/kube-control-plane-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"TargetUpdateRequired","message":"\"service-network-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"All is well\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\",Available changed from Unknown to False (\"StaticPodsAvailable: 0 nodes are active; \")","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/loadbalancer-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"TargetUpdateRequired","message":"\"external-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/service-network-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"SecretUpdated","message":"Updated Secret/kube-apiserver-to-kubelet-signer -n openshift-kube-apiserver-operator because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"CABundleUpdateRequired","message":"\"kube-apiserver-to-kubelet-client-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"TargetUpdateRequired","message":"\"localhost-serving-cert-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:06Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Upgradeable message changed from \"All is well\" to \"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced.\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:06Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Progressing message changed from \"All is well\" to \"NodeInstallerProgressing: 1 node is at revision 0\",Available message changed from \"StaticPodsAvailable: 0 nodes are active; \" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"CABundleUpdateRequired","message":"\"node-system-admin-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"TargetUpdateRequired","message":"\"aggregator-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"CABundleUpdateRequired","message":"\"kube-control-plane-signer-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-signer -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"CABundleUpdateRequired","message":"\"localhost-recovery-serving-ca\" in \"openshift-kube-apiserver-operator\" requires a new cert: configmap doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"SecretCreated","message":"Created Secret/service-network-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-control-plane-signer-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"TargetUpdateRequired","message":"\"check-endpoints-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"SecretCreated","message":"Created Secret/localhost-serving-cert-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"RotationError","message":"configmaps \"loadbalancer-serving-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"TargetUpdateRequired","message":"\"internal-loadbalancer-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-aggregator-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"TargetUpdateRequired","message":"\"kube-scheduler-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-kube-apiserver-installer because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"TargetUpdateRequired","message":"\"control-plane-node-admin-client-cert-key\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-to-kubelet-client-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"TargetUpdateRequired","message":"\"kubelet-client\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"SecretCreated","message":"Created Secret/external-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/localhost-recovery-serving-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"TargetUpdateRequired","message":"\"localhost-recovery-serving-certkey\" in \"openshift-kube-apiserver\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/node-system-admin-ca -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"TargetUpdateRequired","message":"\"node-system-admin-client\" in \"openshift-kube-apiserver-operator\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/: configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:11Z","reason":"SecretCreated","message":"Created Secret/bound-service-account-signing-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:11Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:11Z","reason":"SecretCreated","message":"Created Secret/check-endpoints-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"RotationError","message":"configmaps \"kube-control-plane-signer-ca\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"SecretCreated","message":"Created Secret/aggregator-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"TargetUpdateRequired","message":"\"kube-controller-manager-client-cert-key\" in \"openshift-config-managed\" requires a new target cert/key pair: secret doesn't exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"SecretCreated","message":"Created Secret/internal-loadbalancer-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"SecretCreated","message":"Created Secret/control-plane-node-admin-client-cert-key -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"SecretCreated","message":"Created Secret/kubelet-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:13Z","reason":"SecretCreated","message":"Created Secret/node-system-admin-client -n openshift-kube-apiserver-operator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:13Z","reason":"ServiceCreated","message":"Created Service/apiserver -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:13Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:13Z","reason":"SecretCreated","message":"Created Secret/kube-scheduler-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:14Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": secret \\\"node-system-admin-client\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:14Z","reason":"SecretCreated","message":"Created Secret/kube-controller-manager-client-cert-key -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:14Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:14Z","reason":"SecretCreateFailed","message":"Failed to create Secret/bound-service-account-signing-key -n openshift-kube-apiserver: secrets \"bound-service-account-signing-key\" already exists","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:14Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:15Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:15Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-auth-delegator because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:15Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-crd-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:15Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:15Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints-node-reader because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:16Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:check-endpoints -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:16Z","reason":"ConfigMapCreated","message":"Created ConfigMap/check-endpoints-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:16Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:controller:kube-apiserver-check-endpoints -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:17Z","reason":"ConfigMapCreated","message":"Created ConfigMap/aggregator-client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:kube-apiserver-recovery because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/control-plane-node-kubeconfig -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/authentication-reader-for-authenticated-users -n kube-system because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:20Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/localhost-recovery-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-slos-basic -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/audit-errors -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/kube-apiserver-requests -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/api-usage -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"CustomResourceDefinitionUpdated","message":"Updated CustomResourceDefinition.apiextensions.k8s.io/apirequestcounts.apiserver.openshift.io because it changed","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-flowschema-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"StorageVersionMigrationCreated","message":"Created StorageVersionMigration.migration.k8s.io/flowcontrol-prioritylevel-storage-version-migration-v1beta3 because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-kube-apiserver/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"PrometheusRuleCreated","message":"Created PrometheusRule.monitoring.coreos.com/podsecurity -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nCertRotation_KubeControllerManagerClient_Degraded: configmaps \\\"kube-control-plane-signer-ca\\\" already exists\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"TargetConfigDeleted","message":"Deleted target configmap openshift-config-managed/kubelet-serving-ca because source config does not exist","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:25Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:25Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:26Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:26Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"admission\": map[string]any{\n+ \t\t\"pluginConfig\": map[string]any{\n+ \t\t\t\"PodSecurity\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/ExternalIPRanger\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t\t\"network.openshift.io/RestrictedEndpointsAdmission\": map[string]any{\"configuration\": map[string]any{...}},\n+ \t\t},\n+ \t},\n+ \t\"apiServerArguments\": map[string]any{\n+ \t\t\"api-audiences\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"etcd-servers\": []any{string(\"https://192.168.32.10:2379\"), string(\"https://localhost:2379\")},\n+ \t\t\"feature-gates\": []any{\n+ \t\t\tstring(\"AWSEFSDriverVolumeMetrics=true\"), string(\"AdminNetworkPolicy=true\"),\n+ \t\t\tstring(\"AlibabaPlatform=true\"), string(\"AzureWorkloadIdentity=true\"),\n+ \t\t\tstring(\"BareMetalLoadBalancer=true\"), string(\"BuildCSIVolumes=true\"),\n+ \t\t\tstring(\"ChunkSizeMiB=true\"), string(\"CloudDualStackNodeIPs=true\"), ...,\n+ \t\t},\n+ \t\t\"goaway-chance\": []any{string(\"0\")},\n+ \t\t\"runtime-config\": []any{string(\"admissionregistration.k8s.io/v1beta1=true\")},\n+ \t\t\"send-retry-after-while-not-ready-once\": []any{string(\"true\")},\n+ \t\t\"service-account-issuer\": []any{string(\"https://kubernetes.default.svc\")},\n+ \t\t\"service-account-jwks-uri\": []any{string(\"https://api.sno.openstack.lab:6443/openid/v1/jwks\")},\n+ \t\t\"shutdown-delay-duration\": []any{string(\"0s\")},\n+ \t},\n+ \t\"corsAllowedOrigins\": []any{string(`//127\\.0\\.0\\.1(:|$)`), string(\"//localhost(:|$)\")},\n+ \t\"gracefulTerminationDuration\": string(\"15\"),\n+ \t\"servicesSubnet\": string(\"172.30.0.0/16\"),\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"bindAddress\": string(\"0.0.0.0:6443\"),\n+ \t\t\"bindNetwork\": string(\"tcp4\"),\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t\t\"namedCertificates\": []any{\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-certs\"...),\n+ \t\t\t},\n+ \t\t\tmap[string]any{\n+ \t\t\t\t\"certFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t\t\"keyFile\": string(\"/etc/kubernetes/static-pod-resou\"...),\n+ \t\t\t},\n+ \t\t},\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:27Z","reason":"ConfigMissing","message":"no observedConfig","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:29Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\\nCertRotation_InternalLoadBalancerServing_Degraded: configmaps \\\"loadbalancer-serving-ca\\\" already exists\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:33Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/config-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-pod-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"ConfigMapCreated","message":"Created ConfigMap/client-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-cert-syncer-kubeconfig-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-client-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"ConfigMapCreated","message":"Created ConfigMap/bound-sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:37Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" not found\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-server-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"SecretCreated","message":"Created Secret/node-kubeconfigs -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmap \\\"kube-apiserver-pod\\\" not found\" to \"NodeKubeconfigControllerDegraded: \\\"secret/node-kubeconfigs\\\": configmap \\\"kube-apiserver-server-ca\\\" not found\\nInstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kubelet-serving-ca-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:41Z","reason":"ConfigMapCreated","message":"Created ConfigMap/sa-token-signing-certs-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/kube-apiserver-audit-policies-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/client-ca -n openshift-kube-apiserver:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"SecretCreated","message":"Created Secret/etcd-client-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:44Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/kube-apiserver-client-ca -n openshift-config-managed:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:46Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-client-token-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:46Z","reason":"SecretCreated","message":"Created Secret/localhost-recovery-serving-certkey-1 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:48Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"kube-apiserver-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:48Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0","type":"Warning"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:48Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\\nRevisionControllerDegraded: configmaps \\\"kubelet-serving-ca\\\" not found\" to \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:51Z","reason":"NodeTargetRevisionChanged","message":"Updating node \"master-0\" from revision 0 to 1 because node master-0 static pod not found","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:51Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/kube-apiserver changed: Degraded message changed from \"InstallerControllerDegraded: missing required resources: [configmaps: bound-sa-token-signing-certs-0,config-0,etcd-serving-ca-0,kube-apiserver-audit-policies-0,kube-apiserver-cert-syncer-kubeconfig-0,kube-apiserver-pod-0,kubelet-serving-ca-0,sa-token-signing-certs-0, secrets: etcd-client-0,localhost-recovery-client-token-0,localhost-recovery-serving-certkey-0]\\nNodeControllerDegraded: All master nodes are ready\" to \"NodeControllerDegraded: All master nodes are ready\",Progressing changed from False to True (\"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1\"),Available message changed from \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0\" to \"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1\"","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:08:54Z","reason":"PodCreated","message":"Created Pod/installer-1-master-0 -n openshift-kube-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65\" already present on machine","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Created","message":"Created container: kube-apiserver-operator","type":"Normal"},{"namespace":"openshift-kube-apiserver-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Started","message":"Started container kube-apiserver-operator","type":"Normal"}]}events/openshift-etcd.json0000640000000000000000000001260615156522230014361 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:49Z","reason":"Started","message":"Started container installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.44/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:49Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:08:49Z","reason":"Created","message":"Created container: installer","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:09:20Z","reason":"Killing","message":"Stopping container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:09:33Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:09:34Z","reason":"Created","message":"Created container: setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:09:34Z","reason":"Started","message":"Started container setup","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:09:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:09:48Z","reason":"Started","message":"Started container etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:09:48Z","reason":"Created","message":"Created container: etcd-ensure-env-vars","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:02Z","reason":"Started","message":"Started container etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:02Z","reason":"Created","message":"Created container: etcd-resources-copy","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:02Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:16Z","reason":"Created","message":"Created container: etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:16Z","reason":"Created","message":"Created container: etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:16Z","reason":"Started","message":"Started container etcd-metrics","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:16Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:16Z","reason":"Started","message":"Started container etcd","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:16Z","reason":"Created","message":"Created container: etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:16Z","reason":"Started","message":"Started container etcdctl","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:17Z","reason":"Started","message":"Started container etcd-readyz","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:17Z","reason":"Started","message":"Started container etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:17Z","reason":"Created","message":"Created container: etcd-rev","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:17Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd","lastTimestamp":"2026-03-18T13:10:17Z","reason":"Created","message":"Created container: etcd-readyz","type":"Normal"}]}events/openshift-etcd-operator.json0000640000000000000000000004005315156522230016207 0ustar0000000000000000{"items":[{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:02:16Z","reason":"ScalingReplicaSet","message":"Scaled up replica set etcd-operator-8544cbcf9c to 1","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:02:26Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:06:15Z","reason":"FailedCreate","message":"Error creating: pods \"etcd-operator-8544cbcf9c-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:06:18Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:06:18Z","reason":"SuccessfulCreate","message":"Created pod: etcd-operator-8544cbcf9c-hmbpl","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Scheduled","message":"Successfully assigned openshift-etcd-operator/etcd-operator-8544cbcf9c-hmbpl to master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:50Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.15/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:07:55Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:16Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" in 3.557s (3.557s including waiting). Image size: 518384969 bytes.","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"LeaderElection","message":"etcd-operator-8544cbcf9c-hmbpl_54e1ba1f-8800-4f83-a97e-b669d40662a0 became leader","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"FeatureGatesInitialized","message":"FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{\"AWSEFSDriverVolumeMetrics\", \"AdminNetworkPolicy\", \"AlibabaPlatform\", \"AzureWorkloadIdentity\", \"BareMetalLoadBalancer\", \"BuildCSIVolumes\", \"ChunkSizeMiB\", \"CloudDualStackNodeIPs\", \"DisableKubeletCloudCredentialProviders\", \"GCPLabelsTags\", \"HardwareSpeed\", \"IngressControllerLBSubnetsAWS\", \"KMSv1\", \"ManagedBootImages\", \"ManagedBootImagesAWS\", \"MultiArchInstallAWS\", \"MultiArchInstallGCP\", \"NetworkDiagnosticsConfig\", \"NetworkLiveMigration\", \"NetworkSegmentation\", \"NewOLM\", \"NodeDisruptionPolicy\", \"OnClusterBuild\", \"PersistentIPsForVirtualization\", \"PrivateHostedZoneAWS\", \"SetEIPForNLBIngressController\", \"StreamingCollectionEncodingToJSON\", \"StreamingCollectionEncodingToProtobuf\", \"VSphereControlPlaneMachineSet\", \"VSphereDriverConfiguration\", \"VSphereMultiVCenters\", \"VSphereStaticIPs\", \"ValidatingAdmissionPolicy\"}, Disabled:[]v1.FeatureGateName{\"AWSClusterHostedDNS\", \"AdditionalRoutingCapabilities\", \"AutomatedEtcdBackup\", \"BootcNodeManagement\", \"CSIDriverSharedResource\", \"ClusterAPIInstall\", \"ClusterAPIInstallIBMCloud\", \"ClusterMonitoringConfig\", \"ConsolePluginContentSecurityPolicy\", \"DNSNameResolver\", \"DynamicResourceAllocation\", \"EtcdBackendQuota\", \"EventedPLEG\", \"Example\", \"ExternalOIDC\", \"ExternalOIDCWithUIDAndExtraClaimMappings\", \"GCPClusterHostedDNS\", \"GatewayAPI\", \"ImageStreamImportMode\", \"IngressControllerDynamicConfigurationManager\", \"InsightsConfig\", \"InsightsConfigAPI\", \"InsightsOnDemandDataGather\", \"InsightsRuntimeExtractor\", \"MachineAPIMigration\", \"MachineAPIOperatorDisableMachineHealthCheckController\", \"MachineAPIProviderOpenStack\", \"MachineConfigNodes\", \"MaxUnavailableStatefulSet\", \"MetricsCollectionProfiles\", \"MinimumKubeletVersion\", \"MixedCPUsAllocation\", \"MultiArchInstallAzure\", \"NodeSwap\", \"NutanixMultiSubnets\", \"OVNObservability\", \"OpenShiftPodSecurityAdmission\", \"PinnedImages\", \"PlatformOperators\", \"ProcMountType\", \"RouteAdvertisements\", \"RouteExternalCertificate\", \"ServiceAccountTokenNodeBinding\", \"SignatureStores\", \"SigstoreImageVerification\", \"TranslateStreamCloseWebsocketRequests\", \"UpgradeStatus\", \"UserNamespacesPodSecurityStandards\", \"UserNamespacesSupport\", \"VSphereMultiNetworks\", \"VolumeAttributesClass\", \"VolumeGroupSnapshot\"}}","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"ReportEtcdMembersErrorUpdatingStatus","message":"etcds.operator.openshift.io \"cluster\" not found","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"OperatorVersionChanged","message":"clusteroperator/etcd version \"raw-internal\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"MasterNodeObserved","message":"Observed new master node master-0","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded message changed from \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\" to \"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\\nRevisionControllerDegraded: configmap \\\"etcd-pod\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"raw-internal\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Degraded changed from Unknown to False (\"EtcdMembersControllerDegraded: getting cache client could not retrieve endpoints: node lister not synced\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/etcd changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"ObservedConfigChanged","message":"Writing updated observed config: map[string]any{\n+ \t\"controlPlane\": map[string]any{\"replicas\": float64(1)},\n+ \t\"servingInfo\": map[string]any{\n+ \t\t\"cipherSuites\": []any{\n+ \t\t\tstring(\"TLS_AES_128_GCM_SHA256\"), string(\"TLS_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_CHACHA20_POLY1305_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\"),\n+ \t\t\tstring(\"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\"), ...,\n+ \t\t},\n+ \t\t\"minTLSVersion\": string(\"VersionTLS12\"),\n+ \t},\n }\n","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"ConfigMapUpdated","message":"Updated ConfigMap/etcd-ca-bundle -n openshift-etcd-operator:\ncause by changes in data.ca-bundle.crt","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:operator:openshift-etcd-installer because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/installer-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/cluster-config-v1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"NamespaceUpdated","message":"Updated Namespace/openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-ca-bundle -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-config because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:22Z","reason":"MasterNodesReadyChanged","message":"All master nodes are ready","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-metric-serving-ca -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/etcd-sa -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd-minimal -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ServiceMonitorCreated","message":"Created ServiceMonitor.monitoring.coreos.com/etcd -n openshift-etcd-operator because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"EtcdEndpointsErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ServiceUpdated","message":"Updated Service/etcd -n openshift-etcd because it changed","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:26Z","reason":"ObservedConfigWriteError","message":"Failed to write observed config: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:27Z","reason":"DefragControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"RequiredInstallerResourcesMissing","message":"configmaps: etcd-all-bundles-0,etcd-endpoints-0,etcd-pod-0, secrets: etcd-all-certs-0","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"ScriptControllerErrorUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"EnvVarControllerUpdatingStatus","message":"Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"etcd-pod-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-scripts -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/restore-etcd-pod -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-pod-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:40Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-endpoints-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:42Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-all-bundles-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:08:43Z","reason":"SecretCreated","message":"Created Secret/etcd-all-certs-1 -n openshift-etcd because it was missing","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a\" already present on machine","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Started","message":"Started container etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:10:28Z","reason":"Created","message":"Created container: etcd-operator","type":"Normal"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:10:33Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-etcd-operator","lastTimestamp":"2026-03-18T13:10:33Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused\nbody: \n","type":"Warning"}]}events/openshift-oauth-apiserver.json0000640000000000000000000000443715156522230016563 0ustar0000000000000000{"items":[{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:36Z","reason":"ScalingReplicaSet","message":"Scaled up replica set apiserver-7d95bbc4f4 to 1","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:37Z","reason":"SuccessfulCreate","message":"Created pod: apiserver-7d95bbc4f4-4ch22","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:38Z","reason":"Scheduled","message":"Successfully assigned openshift-oauth-apiserver/apiserver-7d95bbc4f4-4ch22 to master-0","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:38Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.33/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:41Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\"","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:46Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" in 4.388s (4.388s including waiting). Image size: 505345991 bytes.","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:46Z","reason":"Created","message":"Created container: fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:46Z","reason":"Started","message":"Started container fix-audit-permissions","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634\" already present on machine","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Created","message":"Created container: oauth-apiserver","type":"Normal"},{"namespace":"openshift-oauth-apiserver","lastTimestamp":"2026-03-18T13:08:47Z","reason":"Started","message":"Started container oauth-apiserver","type":"Normal"}]}events/openshift-ingress.json0000640000000000000000000000124015156522230015104 0ustar0000000000000000{"items":[{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:08:48Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node-role.kubernetes.io/master: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:08:48Z","reason":"SuccessfulCreate","message":"Created pod: router-default-7dcf5569b5-mtnzv","type":"Normal"},{"namespace":"openshift-ingress","lastTimestamp":"2026-03-18T13:08:48Z","reason":"ScalingReplicaSet","message":"Scaled up replica set router-default-7dcf5569b5 to 1","type":"Normal"}]}events/openshift-authentication-operator.json0000640000000000000000000023476715156522230020330 0ustar0000000000000000{"items":[{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:02:17Z","reason":"ScalingReplicaSet","message":"Scaled up replica set authentication-operator-5885bfd7f4 to 1","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:02:27Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:06:15Z","reason":"FailedCreate","message":"Error creating: pods \"authentication-operator-5885bfd7f4-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:06:17Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:06:17Z","reason":"SuccessfulCreate","message":"Created pod: authentication-operator-5885bfd7f4-mqh5c","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:48Z","reason":"Scheduled","message":"Successfully assigned openshift-authentication-operator/authentication-operator-5885bfd7f4-mqh5c to master-0","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:49Z","reason":"AddedInterface","message":"Add eth0 [10.128.0.8/23] from ovn-kubernetes","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:07:52Z","reason":"Pulling","message":"Pulling image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:03Z","reason":"Pulled","message":"Successfully pulled image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" in 10.293s (10.293s including waiting). Image size: 513221333 bytes.","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:03Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:03Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:05Z","reason":"LeaderElection","message":"authentication-operator-5885bfd7f4-mqh5c_d9dfa2df-7538-4156-8713-6cbeedee3d7c became leader","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:06Z","reason":"FastControllerResync","message":"Controller \"auditPolicyController\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded changed from Unknown to False (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ObserveTemplates","message":"templates changed to map[\"error\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/errors.html\" \"login\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/login.html\" \"providerSelection\":\"/var/config/system/secrets/v4-0-config-system-ocp-branding-template/providers.html\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ObserveAPIServerURL","message":"loginURL changed from to https://api.sno.openstack.lab:6443","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ObserveAuditProfile","message":"AuditProfile changed from '%!s(\u003cnil\u003e)' to 'map[audit-log-format:[json] audit-log-maxbackup:[10] audit-log-maxsize:[100] audit-log-path:[/var/log/oauth-server/audit.log] audit-policy-file:[/var/run/configmaps/audit/audit.yaml]]'","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ObserveTokenConfig","message":"accessTokenMaxAgeSeconds changed from %!d(float64=0) to %!d(float64=86400)","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\\"oauthConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"assetPublicURL\\\": string(\\\"\\\"),\\n+\\u00a0\\t\\t\\t\\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"),\\n+\\u00a0\\t\\t\\t\\\"templates\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-\\\"...),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tokenConfig\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"accessTokenMaxAgeSeconds\\\": float64(86400),\\n+\\u00a0\\t\\t\\t\\t\\\"authorizeTokenMaxAgeSeconds\\\": float64(300),\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"serverArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"audit-log-format\\\": []any{string(\\\"json\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")},\\n+\\u00a0\\t\\t\\t\\\"audit-policy-file\\\": []any{string(\\\"/var/run/configmaps/audit/audit.\\\"...)},\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"servingInfo\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"cipherSuites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Upgradeable changed from Unknown to True (\"All is well\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"All is well\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \",Progressing changed from Unknown to False (\"All is well\"),Available changed from Unknown to False (\"\")","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded set to Unknown (\"\"),Progressing set to Unknown (\"\"),Available set to Unknown (\"\"),Upgradeable set to Unknown (\"\"),EvaluationConditionsDetected set to Unknown (\"\"),status.versions changed from [] to [{\"operator\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:09Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"operator\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthAPIServer\") of observed config: \"\\u00a0\\u00a0map[string]any(\\n-\\u00a0\\tnil,\\n+\\u00a0\\t{\\n+\\u00a0\\t\\t\\\"apiServerArguments\\\": map[string]any{\\n+\\u00a0\\t\\t\\t\\\"api-audiences\\\": []any{string(\\\"https://kubernetes.default.svc\\\")},\\n+\\u00a0\\t\\t\\t\\\"cors-allowed-origins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n+\\u00a0\\t\\t\\t\\\"etcd-servers\\\": []any{string(\\\"https://192.168.32.10:2379\\\")},\\n+\\u00a0\\t\\t\\t\\\"tls-cipher-suites\\\": []any{\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"),\\n+\\u00a0\\t\\t\\t\\tstring(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM\\\"...), ...,\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t\\t\\\"tls-min-version\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t},\\n+\\u00a0\\t},\\n\\u00a0\\u00a0)\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"ObserveAPIAudiences","message":"service account issuer changed from to https://kubernetes.default.svc","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"ObserveTLSSecurityProfile","message":"minTLSVersion changed to VersionTLS12","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"ObserveTLSSecurityProfile","message":"cipherSuites changed to [\"TLS_AES_128_GCM_SHA256\" \"TLS_AES_256_GCM_SHA384\" \"TLS_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\" \"TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384\" \"TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256\" \"TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256\"]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"ObserveStorageUpdated","message":"Updated storage urls to https://192.168.32.10:2379","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"FastControllerResync","message":"Controller \"openshift-apiserver-APIService\" resync interval is set to 10s which might lead to client request throttling","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\" to \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:10Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:11Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"CSRCreated","message":"A csr \"system:openshift:openshift-authenticator-p4gfr\" is created for OpenShiftAuthenticatorCertRequester","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"CSRApproval","message":"The CSR \"system:openshift:openshift-authenticator-p4gfr\" has been approved","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:12Z","reason":"NoValidCertificateFound","message":"No valid client certificate for OpenShiftAuthenticatorCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:13Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-authentication: namespaces \"openshift-authentication\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:13Z","reason":"ConfigMapCreateFailed","message":"Failed to create ConfigMap/audit -n openshift-oauth-apiserver: namespaces \"openshift-oauth-apiserver\" not found","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:13Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:14Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:14Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:15Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:17Z","reason":"ClientCertificateCreated","message":"A new client certificate for OpenShiftAuthenticatorCertRequester is available","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"NamespaceCreated","message":"Created Namespace/openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"StartingNewRevision","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:18Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"ServiceCreated","message":"Created Service/api -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServicesAvailable: endpoints \\\"api\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"All is well\" to \"AuthenticatorCertKeyProgressing: All is well\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:19Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nAuditPolicyDegraded: namespaces \\\"openshift-oauth-apiserver\\\" not found\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to retrieve service openshift-oauth-apiserver/api: service \\\"api\\\" not found\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:21Z","reason":"ConfigMapCreated","message":"Created ConfigMap/v4-0-config-system-trusted-ca-bundle -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:23Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit-1 -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-ocp-branding-template -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-apiserver-sa -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ClusterRoleBindingCreated","message":"Created ClusterRoleBinding.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:24Z","reason":"ClusterRoleCreated","message":"Created ClusterRole.rbac.authorization.k8s.io/system:openshift:useroauthaccesstoken-manager because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:25Z","reason":"ConfigMapCreated","message":"Created ConfigMap/etcd-serving-ca -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:27Z","reason":"SecretCreated","message":"Created Secret/etcd-client -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"RevisionTriggered","message":"new revision 1 triggered by \"configmap \\\"audit-0\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nRevisionControllerDegraded: configmap \\\"audit\\\" not found\\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:28Z","reason":"ServiceAccountCreated","message":"Created ServiceAccount/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"ServiceCreated","message":"Created Service/oauth-openshift -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:35Z","reason":"DeploymentCreated","message":"Created Deployment.apps/apiserver -n openshift-oauth-apiserver because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"RoleCreated","message":"Created Role.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:36Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"APIServerDeploymentDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerDeploymentDegraded: \\nAPIServerWorkloadDegraded: waiting for .status.latestAvailableRevision to be available\\nAPIServerWorkloadDegraded: \\nWebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Progressing changed from False to True (\"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\"),Available message changed from \"APIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:37Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: configmap \\\"v4-0-config-system-service-ca\\\" not found\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"RoleBindingCreated","message":"Created RoleBinding.rbac.authorization.k8s.io/system:openshift:oauth-servercert-trust -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServiceDegraded: Unable to get oauth server service: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No endpoints found for oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\",Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: service \\\"oauth-openshift\\\" not found\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nSystemServiceCAConfigDegraded: Config \\\"\\\" has no service CA data\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: \\\"service-ca.crt\\\" key of the \\\"openshift-authentication/v4-0-config-system-service-ca\\\" CM is empty\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:38Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing message changed from \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: observed generation is 0, desired generation is 1.\" to \"APIServerDeploymentProgressing: deployment/apiserver.openshift-oauth-apiserver: 1/1 pods have been updated to the latest generation and 0/1 pods are available\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:39Z","reason":"ConfigMapCreated","message":"Created ConfigMap/audit -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:44Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \\\"oauth-openshift/audit-policy.yaml\\\" (string): namespaces \\\"openshift-authentication\\\" not found\\nOpenshiftAuthenticationStaticResourcesDegraded: \" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:49Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.oauth.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:49Z","reason":"\u003cunknown\u003eCreated","message":"Created \u003cunknown\u003e/v1.user.openshift.io because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:49Z","reason":"OpenShiftAPICheckFailed","message":"\"oauth.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:49Z","reason":"OpenShiftAPICheckFailed","message":"\"user.openshift.io.v1\" failed with an attempt failed with statusCode = 503, err = the server is currently unable to handle the request","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: PreconditionNotReady\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:49Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: \\\"oauth.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nAPIServicesAvailable: \\\"user.openshift.io.v1\\\" is not ready: an attempt failed with statusCode = 503, err = the server is currently unable to handle the request\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.33:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.33:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.33:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.33:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:50Z","reason":"OperatorVersionChanged","message":"clusteroperator/authentication version \"oauth-apiserver\" changed from \"\" to \"4.18.35\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: status.versions changed from [{\"operator\" \"4.18.35\"}] to [{\"operator\" \"4.18.35\"} {\"oauth-apiserver\" \"4.18.35\"}]","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:50Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Progressing changed from True to False (\"AuthenticatorCertKeyProgressing: All is well\"),Available message changed from \"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.33:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.33:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.33:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.33:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\" to \"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.33:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.33:8443/apis/oauth.openshift.io/v1: 401\\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.33:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.33:8443/apis/user.openshift.io/v1: 401\\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \\\"oauth-openshift\\\" not found\\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods).\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:51Z","reason":"ObserveRouterSecret","message":"namedCertificates changed to []interface {}{map[string]interface {}{\"certFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"keyFile\":\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.sno.openstack.lab\", \"names\":[]interface {}{\"*.apps.sno.openstack.lab\"}}}","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:52Z","reason":"ObservedConfigChanged","message":"Writing updated section (\"oauthServer\") of observed config: \"\\u00a0\\u00a0map[string]any{\\n\\u00a0\\u00a0\\t\\\"corsAllowedOrigins\\\": []any{string(`//127\\\\.0\\\\.0\\\\.1(:|$)`), string(\\\"//localhost(:|$)\\\")},\\n\\u00a0\\u00a0\\t\\\"oauthConfig\\\": map[string]any{\\\"assetPublicURL\\\": string(\\\"\\\"), \\\"loginURL\\\": string(\\\"https://api.sno.openstack.lab:6443\\\"), \\\"templates\\\": map[string]any{\\\"error\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"login\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...), \\\"providerSelection\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-ocp-branding-templ\\\"...)}, \\\"tokenConfig\\\": map[string]any{\\\"accessTokenMaxAgeSeconds\\\": float64(86400), \\\"authorizeTokenMaxAgeSeconds\\\": float64(300)}},\\n\\u00a0\\u00a0\\t\\\"serverArguments\\\": map[string]any{\\\"audit-log-format\\\": []any{string(\\\"json\\\")}, \\\"audit-log-maxbackup\\\": []any{string(\\\"10\\\")}, \\\"audit-log-maxsize\\\": []any{string(\\\"100\\\")}, \\\"audit-log-path\\\": []any{string(\\\"/var/log/oauth-server/audit.log\\\")}, ...},\\n\\u00a0\\u00a0\\t\\\"servingInfo\\\": map[string]any{\\n\\u00a0\\u00a0\\t\\t\\\"cipherSuites\\\": []any{string(\\\"TLS_AES_128_GCM_SHA256\\\"), string(\\\"TLS_AES_256_GCM_SHA384\\\"), string(\\\"TLS_CHACHA20_POLY1305_SHA256\\\"), string(\\\"TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256\\\"), ...},\\n\\u00a0\\u00a0\\t\\t\\\"minTLSVersion\\\": string(\\\"VersionTLS12\\\"),\\n+\\u00a0\\t\\t\\\"namedCertificates\\\": []any{\\n+\\u00a0\\t\\t\\tmap[string]any{\\n+\\u00a0\\t\\t\\t\\t\\\"certFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"keyFile\\\": string(\\\"/var/config/system/secrets/v4-0-config-system-router-certs/apps.\\\"...),\\n+\\u00a0\\t\\t\\t\\t\\\"names\\\": []any{string(\\\"*.apps.sno.openstack.lab\\\")},\\n+\\u00a0\\t\\t\\t},\\n+\\u00a0\\t\\t},\\n\\u00a0\\u00a0\\t},\\n\\u00a0\\u00a0\\t\\\"volumesToMount\\\": map[string]any{\\\"identityProviders\\\": string(\\\"{}\\\")},\\n\\u00a0\\u00a0}\\n\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:52Z","reason":"SecretCreated","message":"Created Secret/v4-0-config-system-router-certs -n openshift-authentication because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerConfigObservationDegraded: secret \\\"v4-0-config-system-router-certs\\\" not found\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:52Z","reason":"OperatorStatusChanged","message":"Status for clusteroperator/authentication changed: Degraded message changed from \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nRouterCertsDegraded: neither the custom secret/v4-0-config-system-router-certs -n openshift-authentication or default secret/v4-0-config-system-custom-router-certs -n openshift-authentication could be retrieved: secret \\\"v4-0-config-system-router-certs\\\" not found\" to \"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://172.30.71.102:443/healthz\\\": dial tcp 172.30.71.102:443: connect: connection refused\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\"","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:08:55Z","reason":"ConfigMapCreated","message":"Created ConfigMap/oauth-serving-cert -n openshift-config-managed because it was missing","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:09:52Z","reason":"ProbeError","message":"Liveness probe error: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused\nbody: \n","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:09:52Z","reason":"Unhealthy","message":"Liveness probe failed: Get \"https://10.128.0.8:8443/healthz\": dial tcp 10.128.0.8:8443: connect: connection refused","type":"Warning"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:10:25Z","reason":"Pulled","message":"Container image \"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427\" already present on machine","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:10:25Z","reason":"Created","message":"Created container: authentication-operator","type":"Normal"},{"namespace":"openshift-authentication-operator","lastTimestamp":"2026-03-18T13:10:25Z","reason":"Started","message":"Started container authentication-operator","type":"Normal"}]}events/openshift-config-managed.json0000640000000000000000000000061015156522230016271 0ustar0000000000000000{"items":[{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-18T13:08:48Z","reason":"PublishedRouterCA","message":"Published \"default-ingress-cert\" in \"openshift-config-managed\"","type":"Normal"},{"namespace":"openshift-config-managed","lastTimestamp":"2026-03-18T13:08:48Z","reason":"PublishedRouterCertificates","message":"Published router certificates","type":"Normal"}]}config/serviceaccounts.json0000640000000000000000000003472315156522223014614 0ustar0000000000000000{"serviceAccounts":{"TOTAL_COUNT":337,"namespaces":{"default":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-public":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"kube-system":[{"name":"attachdetach-controller","secrets":1},{"name":"builder","secrets":1},{"name":"certificate-controller","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"clusterrole-aggregation-controller","secrets":1},{"name":"cronjob-controller","secrets":1},{"name":"daemon-set-controller","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"deployment-controller","secrets":1},{"name":"disruption-controller","secrets":1},{"name":"endpoint-controller","secrets":1},{"name":"endpointslice-controller","secrets":1},{"name":"endpointslicemirroring-controller","secrets":1},{"name":"ephemeral-volume-controller","secrets":1},{"name":"expand-controller","secrets":1},{"name":"generic-garbage-collector","secrets":1},{"name":"horizontal-pod-autoscaler","secrets":1},{"name":"job-controller","secrets":1},{"name":"legacy-service-account-token-cleaner","secrets":1},{"name":"namespace-controller","secrets":1},{"name":"node-controller","secrets":1},{"name":"persistent-volume-binder","secrets":1},{"name":"pod-garbage-collector","secrets":1},{"name":"pv-protection-controller","secrets":1},{"name":"pvc-protection-controller","secrets":1},{"name":"replicaset-controller","secrets":1},{"name":"replication-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"root-ca-cert-publisher","secrets":1},{"name":"service-account-controller","secrets":1},{"name":"service-ca-cert-publisher","secrets":1},{"name":"statefulset-controller","secrets":1},{"name":"ttl-after-finished-controller","secrets":1},{"name":"validatingadmissionpolicy-status-controller","secrets":1}],"openshift":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-sa","secrets":1}],"openshift-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-apiserver-operator","secrets":1}],"openshift-authentication":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-openshift","secrets":1}],"openshift-authentication-operator":[{"name":"authentication-operator","secrets":1},{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-catalogd":[{"name":"builder","secrets":1},{"name":"catalogd-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager":[{"name":"builder","secrets":1},{"name":"cloud-controller-manager","secrets":1},{"name":"cloud-node-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"cluster-cloud-controller-manager","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-credential-operator":[{"name":"builder","secrets":1},{"name":"cloud-credential-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-network-config-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cloud-platform-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-csi-drivers":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-machine-approver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-approver-sa","secrets":1}],"openshift-cluster-node-tuning-operator":[{"name":"builder","secrets":1},{"name":"cluster-node-tuning-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"tuned","secrets":1}],"openshift-cluster-olm-operator":[{"name":"builder","secrets":1},{"name":"cluster-olm-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-samples-operator":[{"name":"builder","secrets":1},{"name":"cluster-samples-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-storage-operator":[{"name":"builder","secrets":1},{"name":"cluster-storage-operator","secrets":1},{"name":"csi-snapshot-controller","secrets":1},{"name":"csi-snapshot-controller-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-cluster-version":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-managed":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-config-operator","secrets":1}],"openshift-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-sa","secrets":1}],"openshift-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-controller-manager-operator","secrets":1}],"openshift-dns":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns","secrets":1},{"name":"node-resolver","secrets":1}],"openshift-dns-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"dns-operator","secrets":1}],"openshift-etcd":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-backup-sa","secrets":1},{"name":"etcd-sa","secrets":1},{"name":"installer-sa","secrets":1}],"openshift-etcd-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"etcd-operator","secrets":1}],"openshift-host-network":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-image-registry":[{"name":"builder","secrets":1},{"name":"cluster-image-registry-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"node-ca","secrets":1},{"name":"pruner","secrets":1}],"openshift-infra":[{"name":"build-config-change-controller","secrets":1},{"name":"build-controller","secrets":1},{"name":"builder","secrets":1},{"name":"cluster-csr-approver-controller","secrets":1},{"name":"cluster-quota-reconciliation-controller","secrets":1},{"name":"default","secrets":1},{"name":"default-rolebindings-controller","secrets":1},{"name":"deployer","secrets":1},{"name":"deployer-controller","secrets":1},{"name":"deploymentconfig-controller","secrets":1},{"name":"image-import-controller","secrets":1},{"name":"image-trigger-controller","secrets":1},{"name":"ingress-to-route-controller","secrets":1},{"name":"namespace-security-allocation-controller","secrets":1},{"name":"node-bootstrapper","secrets":1},{"name":"origin-namespace-controller","secrets":1},{"name":"podsecurity-admission-label-syncer-controller","secrets":1},{"name":"privileged-namespaces-psa-label-syncer","secrets":1},{"name":"pv-recycler-controller","secrets":1},{"name":"resourcequota-controller","secrets":1},{"name":"serviceaccount-controller","secrets":1},{"name":"serviceaccount-pull-secrets-controller","secrets":1},{"name":"template-instance-controller","secrets":1},{"name":"template-instance-finalizer-controller","secrets":1},{"name":"unidling-controller","secrets":1}],"openshift-ingress":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"router","secrets":1}],"openshift-ingress-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ingress-operator","secrets":1}],"openshift-insights":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"gather","secrets":1},{"name":"operator","secrets":1}],"openshift-kni-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-kube-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-apiserver-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-apiserver-operator","secrets":1}],"openshift-kube-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"kube-controller-manager-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1}],"openshift-kube-controller-manager-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-controller-manager-operator","secrets":1}],"openshift-kube-scheduler":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"installer-sa","secrets":1},{"name":"localhost-recovery-client","secrets":1},{"name":"openshift-kube-scheduler-sa","secrets":1}],"openshift-kube-scheduler-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"openshift-kube-scheduler-operator","secrets":1}],"openshift-kube-storage-version-migrator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-sa","secrets":1}],"openshift-kube-storage-version-migrator-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"kube-storage-version-migrator-operator","secrets":1}],"openshift-machine-api":[{"name":"builder","secrets":1},{"name":"cluster-autoscaler","secrets":1},{"name":"cluster-autoscaler-operator","secrets":1},{"name":"cluster-baremetal-operator","secrets":1},{"name":"control-plane-machine-set-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-api-controllers","secrets":1},{"name":"machine-api-operator","secrets":1},{"name":"machine-api-termination-handler","secrets":1}],"openshift-machine-config-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"machine-config-controller","secrets":1},{"name":"machine-config-daemon","secrets":1},{"name":"machine-config-operator","secrets":1},{"name":"machine-os-puller","secrets":1}],"openshift-marketplace":[{"name":"builder","secrets":1},{"name":"certified-operators","secrets":1},{"name":"community-operators","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"marketplace-operator","secrets":1},{"name":"redhat-marketplace","secrets":1},{"name":"redhat-operators","secrets":1}],"openshift-monitoring":[{"name":"builder","secrets":1},{"name":"cluster-monitoring-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"prometheus-operator","secrets":1},{"name":"prometheus-operator-admission-webhook","secrets":1}],"openshift-multus":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"metrics-daemon-sa","secrets":1},{"name":"multus","secrets":1},{"name":"multus-ac","secrets":1},{"name":"multus-ancillary-tools","secrets":1}],"openshift-network-diagnostics":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-diagnostics","secrets":1}],"openshift-network-node-identity":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"network-node-identity","secrets":1}],"openshift-network-operator":[{"name":"builder","secrets":1},{"name":"cluster-network-operator","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"iptables-alerter","secrets":1}],"openshift-node":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-nutanix-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-oauth-apiserver":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"oauth-apiserver-sa","secrets":1}],"openshift-openstack-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-operator-controller":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"operator-controller-controller-manager","secrets":1}],"openshift-operator-lifecycle-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"olm-operator-serviceaccount","secrets":1}],"openshift-operators":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovirt-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-ovn-kubernetes":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"ovn-kubernetes-control-plane","secrets":1},{"name":"ovn-kubernetes-node","secrets":1}],"openshift-route-controller-manager":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"route-controller-manager-sa","secrets":1}],"openshift-service-ca":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca","secrets":1}],"openshift-service-ca-operator":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1},{"name":"service-ca-operator","secrets":1}],"openshift-user-workload-monitoring":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}],"openshift-vsphere-infra":[{"name":"builder","secrets":1},{"name":"default","secrets":1},{"name":"deployer","secrets":1}]}}}config/installplans.json0000640000000000000000000000010015156522223014076 0ustar0000000000000000{"items":null,"stats":{"TOTAL_COUNT":0,"TOTAL_NONUNIQ_COUNT":0}}config/node/logs/master-0.log0000640000000000000000000003700615156522210014536 0ustar0000000000000000Mar 18 13:10:27.985991 master-0 kubenswrapper[7146]: E0318 13:10:27.984394 7146 kubelet.go:2526] "Housekeeping took longer than expected" err="housekeeping took too long" expected="1s" actual="2.61s" Mar 18 13:10:33.536745 master-0 kubenswrapper[7146]: E0318 13:10:33.536668 7146 kubelet.go:1929] "Failed creating a mirror pod for" err="pods \"etcd-master-0\" already exists" pod="openshift-etcd/etcd-master-0" Mar 18 13:10:33.801022 master-0 kubenswrapper[7146]: I0318 13:10:33.800894 7146 patch_prober.go:28] interesting pod/etcd-operator-8544cbcf9c-hmbpl container/etcd-operator namespace/openshift-etcd-operator: Liveness probe status=failure output="Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused" start-of-body= Mar 18 13:10:33.801022 master-0 kubenswrapper[7146]: I0318 13:10:33.800980 7146 prober.go:107] "Probe failed" probeType="Liveness" pod="openshift-etcd-operator/etcd-operator-8544cbcf9c-hmbpl" podUID="1bf0ea4e-8b08-488f-b252-39580f46b756" containerName="etcd-operator" probeResult="failure" output="Get \"https://10.128.0.15:8443/healthz\": dial tcp 10.128.0.15:8443: connect: connection refused" Mar 18 13:10:55.045711 master-0 kubenswrapper[7146]: E0318 13:10:55.045686 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="d6fab6cf-3b8f-47a6-837a-319049f487e3" containerName="installer" Mar 18 13:10:55.045919 master-0 kubenswrapper[7146]: E0318 13:10:55.045904 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="88cd8323-8857-41fe-85d4-e6064330ec71" containerName="installer" Mar 18 13:10:55.046112 master-0 kubenswrapper[7146]: E0318 13:10:55.046097 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="82d33ac9-1471-47c5-802c-c267e7c1694f" containerName="installer" Mar 18 13:10:55.046275 master-0 kubenswrapper[7146]: E0318 13:10:55.046262 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f32b4d4d-df54-4fa7-a940-297e064fea44" containerName="installer" Mar 18 13:10:55.046448 master-0 kubenswrapper[7146]: E0318 13:10:55.046435 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="245f3af1-ccfb-4191-9a34-00852e52a73d" containerName="installer" Mar 18 13:10:55.241867 master-0 kubenswrapper[7146]: E0318 13:10:55.241821 7146 cadvisor_stats_provider.go:516] "Partial failure issuing cadvisor.ContainerInfoV2" err="partial failures: [\"/kubepods.slice/kubepods-burstable.slice/kubepods-burstable-pod7a951627_c032_4846_821c_c4bcbf4a91b9.slice\": RecentStats: unable to find data in memory cache]" Mar 18 13:11:01.138478 master-0 kubenswrapper[7146]: E0318 13:11:01.138368 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="cluster-policy-controller" Mar 18 13:11:01.138478 master-0 kubenswrapper[7146]: E0318 13:11:01.138403 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="kube-controller-manager" Mar 18 13:11:01.138478 master-0 kubenswrapper[7146]: E0318 13:11:01.138427 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="kube-controller-manager" Mar 18 13:11:01.139443 master-0 kubenswrapper[7146]: E0318 13:11:01.139194 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="kube-controller-manager" Mar 18 13:11:01.139443 master-0 kubenswrapper[7146]: E0318 13:11:01.139227 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="46f265536aba6292ead501bc9b49f327" containerName="kube-controller-manager" Mar 18 13:11:03.012485 master-0 kubenswrapper[7146]: E0318 13:11:03.012434 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"893603396e8e800b4788d5b94c9dd4a16cacde6fac87a290be4cef783a9a8d41\": container with ID starting with 893603396e8e800b4788d5b94c9dd4a16cacde6fac87a290be4cef783a9a8d41 not found: ID does not exist" containerID="893603396e8e800b4788d5b94c9dd4a16cacde6fac87a290be4cef783a9a8d41" Mar 18 13:11:03.018808 master-0 kubenswrapper[7146]: E0318 13:11:03.017297 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"8e338c40daeb06dda8a9fe3ae91917410047638164a7e8e794580b572222df38\": container with ID starting with 8e338c40daeb06dda8a9fe3ae91917410047638164a7e8e794580b572222df38 not found: ID does not exist" containerID="8e338c40daeb06dda8a9fe3ae91917410047638164a7e8e794580b572222df38" Mar 18 13:11:03.018808 master-0 kubenswrapper[7146]: E0318 13:11:03.017769 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"e8315a2214144fa1792d6c47a099e40e46b488bbaa624b6605c19f7100d3a333\": container with ID starting with e8315a2214144fa1792d6c47a099e40e46b488bbaa624b6605c19f7100d3a333 not found: ID does not exist" containerID="e8315a2214144fa1792d6c47a099e40e46b488bbaa624b6605c19f7100d3a333" Mar 18 13:11:10.495793 master-0 kubenswrapper[7146]: E0318 13:11:10.495727 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="f4d88fc1-4e92-432e-ac2c-e1c489b15e93" containerName="installer" Mar 18 13:11:11.070003 master-0 kubenswrapper[7146]: E0318 13:11:11.069815 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"34948da4a943b048ac43dee7b404a72ee1f371c5d4ee08c40e1377c27b42dcd5\": container with ID starting with 34948da4a943b048ac43dee7b404a72ee1f371c5d4ee08c40e1377c27b42dcd5 not found: ID does not exist" containerID="34948da4a943b048ac43dee7b404a72ee1f371c5d4ee08c40e1377c27b42dcd5" Mar 18 13:11:11.070500 master-0 kubenswrapper[7146]: E0318 13:11:11.070455 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"53b6f2a818ea8ebb3e5400c957f24741f167cf9fba80a4984baaa1bdb7229c33\": container with ID starting with 53b6f2a818ea8ebb3e5400c957f24741f167cf9fba80a4984baaa1bdb7229c33 not found: ID does not exist" containerID="53b6f2a818ea8ebb3e5400c957f24741f167cf9fba80a4984baaa1bdb7229c33" Mar 18 13:11:11.070920 master-0 kubenswrapper[7146]: E0318 13:11:11.070877 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"1013e7a56d2a54fa4a4d96325895916a4829a0189fbb58f24bbcd3715bd15778\": container with ID starting with 1013e7a56d2a54fa4a4d96325895916a4829a0189fbb58f24bbcd3715bd15778 not found: ID does not exist" containerID="1013e7a56d2a54fa4a4d96325895916a4829a0189fbb58f24bbcd3715bd15778" Mar 18 13:11:11.132582 master-0 kubenswrapper[7146]: E0318 13:11:11.132423 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"53a04c73cfc8bd7f1a40a009ff86c9c965937a42458421d21e8c994da8bb91fb\": container with ID starting with 53a04c73cfc8bd7f1a40a009ff86c9c965937a42458421d21e8c994da8bb91fb not found: ID does not exist" containerID="53a04c73cfc8bd7f1a40a009ff86c9c965937a42458421d21e8c994da8bb91fb" Mar 18 13:11:11.133230 master-0 kubenswrapper[7146]: E0318 13:11:11.132720 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"9f38cda3aa6b5e31f38fae8c4af784750da4a078aa04e400295175dc0d72fc57\": container with ID starting with 9f38cda3aa6b5e31f38fae8c4af784750da4a078aa04e400295175dc0d72fc57 not found: ID does not exist" containerID="9f38cda3aa6b5e31f38fae8c4af784750da4a078aa04e400295175dc0d72fc57" Mar 18 13:11:11.133230 master-0 kubenswrapper[7146]: E0318 13:11:11.133092 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"1796a0b0f16eab9307a88efa9cbf5a005462ea8deb7aaed595c97e7cc944c205\": container with ID starting with 1796a0b0f16eab9307a88efa9cbf5a005462ea8deb7aaed595c97e7cc944c205 not found: ID does not exist" containerID="1796a0b0f16eab9307a88efa9cbf5a005462ea8deb7aaed595c97e7cc944c205" Mar 18 13:11:13.075796 master-0 kubenswrapper[7146]: E0318 13:11:13.075368 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e2df6721-ccd2-41e5-bfd5-bd8d277dd57a" containerName="extract-content" Mar 18 13:11:13.075796 master-0 kubenswrapper[7146]: E0318 13:11:13.075401 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e2df6721-ccd2-41e5-bfd5-bd8d277dd57a" containerName="registry-server" Mar 18 13:11:13.075796 master-0 kubenswrapper[7146]: E0318 13:11:13.075421 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="1afcb319-16c7-4f27-9db8-21b105a1bdba" containerName="registry-server" Mar 18 13:11:13.075796 master-0 kubenswrapper[7146]: E0318 13:11:13.075442 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="b282ab6f-702c-44cc-942e-f2320b61d42e" containerName="extract-utilities" Mar 18 13:11:13.075796 master-0 kubenswrapper[7146]: E0318 13:11:13.075461 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="1afcb319-16c7-4f27-9db8-21b105a1bdba" containerName="extract-content" Mar 18 13:11:13.075796 master-0 kubenswrapper[7146]: E0318 13:11:13.075479 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="e2df6721-ccd2-41e5-bfd5-bd8d277dd57a" containerName="extract-utilities" Mar 18 13:11:13.075796 master-0 kubenswrapper[7146]: E0318 13:11:13.075497 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="b282ab6f-702c-44cc-942e-f2320b61d42e" containerName="registry-server" Mar 18 13:11:13.075796 master-0 kubenswrapper[7146]: E0318 13:11:13.075515 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="b282ab6f-702c-44cc-942e-f2320b61d42e" containerName="extract-content" Mar 18 13:11:13.075796 master-0 kubenswrapper[7146]: E0318 13:11:13.075539 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="1afcb319-16c7-4f27-9db8-21b105a1bdba" containerName="extract-utilities" Mar 18 13:11:13.203317 master-0 kubenswrapper[7146]: E0318 13:11:13.203218 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"0c2e3826119c940a98a6c86c39bf2421746ab171d1d0885df4be93564bd994a2\": container with ID starting with 0c2e3826119c940a98a6c86c39bf2421746ab171d1d0885df4be93564bd994a2 not found: ID does not exist" containerID="0c2e3826119c940a98a6c86c39bf2421746ab171d1d0885df4be93564bd994a2" Mar 18 13:11:13.203613 master-0 kubenswrapper[7146]: E0318 13:11:13.203584 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"a1d12eab964d3773f85fd1c53d44479112b0a13ea00f11b75308ae575b897e5b\": container with ID starting with a1d12eab964d3773f85fd1c53d44479112b0a13ea00f11b75308ae575b897e5b not found: ID does not exist" containerID="a1d12eab964d3773f85fd1c53d44479112b0a13ea00f11b75308ae575b897e5b" Mar 18 13:11:13.204052 master-0 kubenswrapper[7146]: E0318 13:11:13.204035 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"1680bc7cb7bda0d4689e9c5a8cd2d140dc338dc26c871d197cd2591dce5e5a99\": container with ID starting with 1680bc7cb7bda0d4689e9c5a8cd2d140dc338dc26c871d197cd2591dce5e5a99 not found: ID does not exist" containerID="1680bc7cb7bda0d4689e9c5a8cd2d140dc338dc26c871d197cd2591dce5e5a99" Mar 18 13:11:24.747962 master-0 kubenswrapper[7146]: E0318 13:11:24.744863 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="aeed4251-c92a-49e9-a785-9903d84ca0d6" containerName="extract-utilities" Mar 18 13:11:24.747962 master-0 kubenswrapper[7146]: E0318 13:11:24.744902 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="aeed4251-c92a-49e9-a785-9903d84ca0d6" containerName="registry-server" Mar 18 13:11:24.747962 master-0 kubenswrapper[7146]: E0318 13:11:24.744957 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="aeed4251-c92a-49e9-a785-9903d84ca0d6" containerName="extract-content" Mar 18 13:11:25.314361 master-0 kubenswrapper[7146]: E0318 13:11:25.314338 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="24935b14-2768-435e-8ed1-73ecac4e05d8" containerName="kube-rbac-proxy" Mar 18 13:11:25.314464 master-0 kubenswrapper[7146]: E0318 13:11:25.314369 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="24935b14-2768-435e-8ed1-73ecac4e05d8" containerName="machine-approver-controller" Mar 18 13:11:25.348016 master-0 kubenswrapper[7146]: E0318 13:11:25.346086 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"37d598af31e9742045e943d48816553143ebb82670be99b1026bc3256c830dbb\": container with ID starting with 37d598af31e9742045e943d48816553143ebb82670be99b1026bc3256c830dbb not found: ID does not exist" containerID="37d598af31e9742045e943d48816553143ebb82670be99b1026bc3256c830dbb" Mar 18 13:11:25.365003 master-0 kubenswrapper[7146]: E0318 13:11:25.363565 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"5e427bca70f9cb972ec6dc92c89edb9505fb47f2af25422e7005f51becc8bf7b\": container with ID starting with 5e427bca70f9cb972ec6dc92c89edb9505fb47f2af25422e7005f51becc8bf7b not found: ID does not exist" containerID="5e427bca70f9cb972ec6dc92c89edb9505fb47f2af25422e7005f51becc8bf7b" Mar 18 13:11:35.424739 master-0 kubenswrapper[7146]: E0318 13:11:35.424585 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"f2683b55176329d1919089ad2d6070fd159596b261fbcae6ee0461c536368e65\": container with ID starting with f2683b55176329d1919089ad2d6070fd159596b261fbcae6ee0461c536368e65 not found: ID does not exist" containerID="f2683b55176329d1919089ad2d6070fd159596b261fbcae6ee0461c536368e65" Mar 18 13:11:35.426374 master-0 kubenswrapper[7146]: E0318 13:11:35.426332 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"bce5b6f24d006c2e2d8d8ea6cc529eddc2c435bcd8ce5ebb4376a2527c82791c\": container with ID starting with bce5b6f24d006c2e2d8d8ea6cc529eddc2c435bcd8ce5ebb4376a2527c82791c not found: ID does not exist" containerID="bce5b6f24d006c2e2d8d8ea6cc529eddc2c435bcd8ce5ebb4376a2527c82791c" Mar 18 13:11:35.426774 master-0 kubenswrapper[7146]: E0318 13:11:35.426747 7146 log.go:32] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = could not find container \"2277f4c8182dc4d77fad8c92de899a18b660c6c886d5078feec2f679e9395f2e\": container with ID starting with 2277f4c8182dc4d77fad8c92de899a18b660c6c886d5078feec2f679e9395f2e not found: ID does not exist" containerID="2277f4c8182dc4d77fad8c92de899a18b660c6c886d5078feec2f679e9395f2e" Mar 18 13:11:35.466955 master-0 kubenswrapper[7146]: E0318 13:11:35.463921 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="fcc459ef-4847-43bc-9f1b-e7bd1335dd8f" containerName="config-sync-controllers" Mar 18 13:11:35.466955 master-0 kubenswrapper[7146]: E0318 13:11:35.463974 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="fcc459ef-4847-43bc-9f1b-e7bd1335dd8f" containerName="cluster-cloud-controller-manager" Mar 18 13:11:35.466955 master-0 kubenswrapper[7146]: E0318 13:11:35.464012 7146 cpu_manager.go:410] "RemoveStaleState: removing container" podUID="fcc459ef-4847-43bc-9f1b-e7bd1335dd8f" containerName="kube-rbac-proxy"aggregated/ingress_controllers_certs.json0000640000000000000000000000045715156522210017532 0ustar0000000000000000[{"name":"router-ca","namespace":"openshift-ingress-operator","not_before":"2026-03-18T13:08:47Z","not_after":"2028-03-17T13:08:48Z","controllers":[]},{"name":"router-certs-default","namespace":"openshift-ingress","not_before":"2026-03-18T13:08:47Z","not_after":"2028-03-17T13:08:48Z","controllers":[]}]config/running_containers.json0000640000000000000000000001137315156522210015311 0ustar0000000000000000{"images":{"0":"sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","1":"sha256:6bba3f73c0066e42b24839e0d29f5dce2f36436f0a11f9f5e1029bccc5ed6578","10":"sha256:ab745a9e15dadc862548ceb5740b8f5d02075232760c6715d82b4c3b70eddca9","11":"sha256:812819a9d712b9e345ef5f1404b242c281e2518ad724baebc393ec0fd3b3d263","12":"sha256:7d4a034950346bcd4e36e9e2f1343e0cf7a10cf544963f33d09c7eb2a1bfc634","13":"sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36","14":"sha256:ae50e496bd6ae2d27298d997470b7cb0a426eeb8b7e2e9c7187a34cb03993998","15":"sha256:951ecfeba9b2da4b653034d09275f925396a79c2d8461b8a7c71c776fee67ba0","16":"sha256:aa5e782406f71c048b1ac3a4bf5d1227ff4be81111114083ad4c7a209c6bfb5a","17":"sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55","18":"sha256:446bedea4916d3c1ee52be94137e484659e9561bd1de95c8189eee279aae984b","19":"sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","2":"sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","20":"registry.redhat.io/redhat/certified-operator-index:v4.18","21":"sha256:1fbbcb390de2563a0177b92fba1b5a65777366e2dc80e2808b61d87c41b47a2d","22":"sha256:af0fe0ca926422a6471d5bf22fc0e682c36c24fba05496a3bdfac0b7d3733015","23":"sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014","24":"sha256:1973d56a1097a48ea0ebf2c4dbae1ed86fa67bb0116f4962f7720d48aa337d27","25":"sha256:7c527b4e8239a1f4f4e0a851113e7dd633b7dcb9d75b0e7b21c23d26304abcb3","26":"sha256:cdd28dfe7132e19af9f013f72cf120d970bc31b6b74693af262f8d2e82a096e1","27":"sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","28":"sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe","29":"sha256:9609c00207cc4db97f0fd6162eb429d7f81654137f020a677e30cba26a887a24","3":"sha256:e29dc9f042f2d0471171a0611070886cb2f7c57338ab7f112613417bcd33b278","30":"sha256:ef199844317b7b012879ed8d29f9b6bc37fad8a6fdb336103cbd5cabc74c4302","31":"sha256:c2dd7a03348212e49876f5359f233d893a541ed9b934df390201a05133a06982","32":"sha256:712d334b7752d95580571059aae2c50e111d879af4fd8ea7cc3dbaf1a8e7dc69","33":"registry.redhat.io/redhat/community-operator-index:v4.18","34":"sha256:1f23bac0a2a6cfd638e4af679dc787a8790d99c391f6e2ade8087dc477ff765e","35":"sha256:313d1d8ca85e65236a59f058a3316c49436dde691b3a3930d5bc5e3b4b8c8a71","36":"sha256:bfe394b58ec6195de8b8420e781b7630d85a412b9112d892fea903f92b783427","37":"sha256:292560e2d80b460468bb19fe0ddf289767c655027b03a76ee6c40c91ffe4c483","38":"sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946","39":"sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","4":"sha256:5b00c42562d477ef44d51f35950253a26d7debc7de86e53270831aafef5795c1","40":"sha256:632e80bba5077068ecca05fddb95aedebad4493af6f36152c01c6ae490975b62","41":"registry.redhat.io/redhat/redhat-operator-index:v4.18","42":"sha256:7af9f5c5af9d529840233ef4b519120cc0e3f14c4fe28cc43b0823f2c11d8f89","43":"sha256:82f2c59d19eb73ad5c0f93b0a63003c1885f5297959c9c45b401d1a74aea6e76","44":"sha256:30a2f97d7785ce8b0ea5115e67c4554b64adefbc7856bcf6f4fe6cc7e938a310","45":"sha256:ea5c8a93f30e0a4932da5697d22c0da7eda9a7035c0555eb006b6755e62bb2fc","46":"sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12","47":"sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","48":"sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d","49":"sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739","5":"sha256:b23c544d3894e5b31f66a18c554f03b0d29f92c2000c46b57b1c96da7ec25db9","50":"sha256:5c983016b9ceed0fca1f51bd49c2653243c7e5af91cbf2f478b091db6e028252","51":"sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e","52":"sha256:a746a87b784ea1caa278fd0e012554f9df520b6fff665ea0bc4c83f487fed113","53":"sha256:ce8e3088493b4a72dd766b3b5b4ccb83b7d72d514bbf64063a913dfe961273db","54":"sha256:908eaaf624959bc7645f6d585d160431d1efb070e9a1f37fefed73a3be42b0d3","55":"sha256:f933312f49083e8746fc41ab5e46a9a757b448374f14971e256ebcb36f11dd97","56":"registry.redhat.io/redhat/redhat-marketplace-index:v4.18","6":"sha256:d5a971d5889f167cfe61a64c366424b87c17a6dc141ffcc43406cdcbb50cae2a","7":"sha256:c032f87ae61d6f757ff3ce52620a70a43516591987731f25da77aba152f17458","8":"sha256:c5ce3d1134d6500e2b8528516c1889d7bbc6259aba4981c6983395b0e9eeff65","9":"sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa"},"containers":{"2026-03":{"0":15,"1":8,"10":2,"11":2,"12":2,"13":2,"14":2,"15":2,"16":2,"17":2,"18":1,"19":1,"2":8,"20":1,"21":1,"22":1,"23":1,"24":1,"25":1,"26":1,"27":1,"28":1,"29":1,"3":6,"30":1,"31":1,"32":1,"33":1,"34":1,"35":1,"36":1,"37":1,"38":1,"39":1,"4":4,"40":1,"41":1,"42":1,"43":1,"44":1,"45":1,"46":1,"47":1,"48":1,"49":1,"5":4,"50":1,"51":1,"52":1,"53":1,"54":1,"55":1,"56":1,"6":3,"7":3,"8":3,"9":2}}}config/pod/openshift-network-operator/network-operator-7bd846bfc4-mk4d5.json0000640000000000000000000002514715156522210025430 0ustar0000000000000000{"metadata":{"name":"network-operator-7bd846bfc4-mk4d5","generateName":"network-operator-7bd846bfc4-","namespace":"openshift-network-operator","uid":"8a0944d2-d99a-42eb-81f5-a212b750b8f4","resourceVersion":"8383","creationTimestamp":"2026-03-18T13:06:16Z","labels":{"name":"network-operator","pod-template-hash":"7bd846bfc4"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"network-operator-7bd846bfc4","uid":"8024a09c-686a-4391-a107-8d77f116bf68","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"host-etc-kube","hostPath":{"path":"/etc/kubernetes","type":"Directory"}},{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420,"optional":true}},{"name":"kube-api-access-882b8","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"network-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","command":["/bin/bash","-c","#!/bin/bash\nset -o allexport\nif [[ -f /etc/kubernetes/apiserver-url.env ]]; then\n source /etc/kubernetes/apiserver-url.env\nelse\n echo \"Error: /etc/kubernetes/apiserver-url.env is missing\"\n exit 1\nfi\nexec /usr/bin/cluster-network-operator start --listen=0.0.0.0:9104\n"],"ports":[{"name":"cno","hostPort":9104,"containerPort":9104,"protocol":"TCP"}],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"KUBE_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:02f0aa65dfd2a58e13248b4e2078caec450fa2bdbacb3afeb34d1de30c909b0f"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"MULTUS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5a55ec7ec64efd0f595d8084377b7e463a1807829b7617e5d4a9092dcd924c36"},{"name":"MULTUS_ADMISSION_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bcb08821551e9a5b9f82aa794bcea673279cefb93cb47492e19ccac5e2cf18fe"},{"name":"CNI_PLUGINS_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5e12e4dc52214d3ada5ba5106caebe079eac1d9292c2571a5fe83411ce8e900d"},{"name":"BOND_CNI_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0e66fd50be6f83ce321a566dfb76f3725b597374077d5af13813b928f6b1267e"},{"name":"WHEREABOUTS_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:0a09f5a3ba4f60cce0145769509bab92553c8075d210af4ac058965d2ae11efa"},{"name":"ROUTE_OVERRRIDE_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:e3a494212f1ba17f0f0980eef583218330eccb56eadf6b8cb0548c76d99b5014"},{"name":"MULTUS_NETWORKPOLICY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:896642a5bdda0cdbeccb0293d3de85f8882ac72678df8d12fb501fd3367982af"},{"name":"OVN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7"},{"name":"OVN_NB_RAFT_ELECTION_TIMER","value":"10"},{"name":"OVN_SB_RAFT_ELECTION_TIMER","value":"16"},{"name":"OVN_NORTHD_PROBE_INTERVAL","value":"10000"},{"name":"OVN_CONTROLLER_INACTIVITY_PROBE","value":"180000"},{"name":"OVN_NB_INACTIVITY_PROBE","value":"60000"},{"name":"EGRESS_ROUTER_CNI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:21b4c9cf268bb7abef7af187cd775d3f74d0bd33626250095428d53b705ee946"},{"name":"NETWORK_METRICS_DAEMON_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:759fb1d5353dbbadd443f38631d977ca3aed9787b873be05cc9660532a252739"},{"name":"NETWORK_CHECK_SOURCE_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_CHECK_TARGET_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"NETWORK_OPERATOR_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4"},{"name":"CLOUD_NETWORK_CONFIG_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b6140aa21678d5652c4d09e21eab5dfad35af30902b705c70f72a384e43868ac"},{"name":"CLI_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"},{"name":"FRR_K8S_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:da26695a0ab94eddc0841bf2ed51b30921e2cdc2a9a5acd0d951081de67f1a97"},{"name":"NETWORKING_CONSOLE_PLUGIN_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:a22978e1669cdbaeee6ec0800f83559b56a2344f1c003f8cd60f27fac939680e"},{"name":"POD_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.name"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"host-etc-kube","readOnly":true,"mountPath":"/etc/kubernetes"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-882b8","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent"}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-network-operator","serviceAccount":"cluster-network-operator","nodeName":"master-0","hostNetwork":true,"securityContext":{"runAsUser":65534,"runAsNonRoot":true},"affinity":{"podAntiAffinity":{"preferredDuringSchedulingIgnoredDuringExecution":[{"weight":100,"podAffinityTerm":{"labelSelector":{"matchLabels":{"name":"network-operator"}},"topologyKey":"kubernetes.io/hostname"}}]}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":300},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:28Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:20Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:06:16Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:06:20Z","containerStatuses":[{"name":"network-operator","state":{"running":{"startedAt":"2026-03-18T13:10:28Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"nshift-network-operator/iptables-alerter: failed to apply / update (/v1, Kind=ServiceAccount) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0318 13:09:24.144906 1 log.go:245] reconciling (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter\nI0318 13:09:24.145083 1 log.go:245] could not apply (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: failed to apply / update (rbac.authorization.k8s.io/v1, Kind=ClusterRoleBinding) /openshift-iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0318 13:09:24.147865 1 log.go:245] reconciling (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script\nI0318 13:09:24.148014 1 log.go:245] could not apply (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: failed to apply / update (/v1, Kind=ConfigMap) openshift-network-operator/iptables-alerter-script: client rate limiter Wait returned an error: context canceled\nI0318 13:09:24.148038 1 log.go:245] reconciling (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter\nI0318 13:09:24.148203 1 log.go:245] could not apply (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: failed to apply / update (apps/v1, Kind=DaemonSet) openshift-network-operator/iptables-alerter: client rate limiter Wait returned an error: context canceled\nI0318 13:09:24.148492 1 genericapiserver.go:691] \"[graceful-termination] pre-shutdown hooks completed\" name=\"PreShutdownHooksStopped\"\nI0318 13:09:24.148513 1 genericapiserver.go:711] [graceful-termination] apiserver is exiting\nI0318 13:09:24.148522 1 builder.go:329] server exited\nI0318 13:09:29.135985 1 observer_polling.go:162] Shutting down file observer\nF0318 13:09:54.137589 1 operator.go:133] Failed to start controller-runtime manager: failed waiting for all runnables to end within grace period of 30s: context deadline exceeded\n","startedAt":"2026-03-18T13:06:28Z","finishedAt":"2026-03-18T13:09:54Z","containerID":"cri-o://6b882cdda72d564225a61ad06267c4be93a7acf1cff49af344ca080e3af8cb10"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:ec8fd46dfb35ed10e8f98933166f69ce579c2f35b8db03d21e4c34fc544553e4","containerID":"cri-o://0c0dff018b4cb570a73508a63c98cc78ae5d31ec05596f9eda1e17c194b6b492","started":true,"volumeMounts":[{"name":"host-etc-kube","mountPath":"/etc/kubernetes","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"metrics-tls","mountPath":"/var/run/secrets/serving-cert"},{"name":"kube-api-access-882b8","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-network-node-identity/network-node-identity-xcbtb.json0000640000000000000000000002464215156522210025774 0ustar0000000000000000{"metadata":{"name":"network-node-identity-xcbtb","generateName":"network-node-identity-","namespace":"openshift-network-node-identity","uid":"eb8907fd-35dd-452a-8032-f2f95a6e553a","resourceVersion":"8336","creationTimestamp":"2026-03-18T13:07:02Z","labels":{"app":"network-node-identity","component":"network","controller-revision-hash":"5d8cf8bd5d","kubernetes.io/os":"linux","openshift.io/component":"network","pod-template-generation":"1","type":"infra"},"annotations":{"openshift.io/required-scc":"hostnetwork-v2","openshift.io/scc":"hostnetwork-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"DaemonSet","name":"network-node-identity","uid":"fdce544a-68d3-4a70-a731-53332c7018da","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"webhook-cert","secret":{"secretName":"network-node-identity-cert","defaultMode":420}},{"name":"env-overrides","configMap":{"name":"env-overrides","defaultMode":420,"optional":true}},{"name":"ovnkube-identity-cm","configMap":{"name":"ovnkube-identity-cm","items":[{"key":"additional-cert-acceptance-cond.json","path":"additional-cert-acceptance-cond.json"},{"key":"additional-pod-admission-cond.json","path":"additional-pod-admission-cond.json"}],"defaultMode":420}},{"name":"kube-api-access-k254v","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"webhook","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n# OVN-K will try to remove hybrid overlay node annotations even when the hybrid overlay is not enabled.\n# https://github.com/ovn-org/ovn-kubernetes/blob/ac6820df0b338a246f10f412cd5ec903bd234694/go-controller/pkg/ovn/master.go#L791\nho_enable=\"--enable-hybrid-overlay\"\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start webhook\"\n# extra-allowed-user: service account `ovn-kubernetes-control-plane`\n# sets pod annotations in multi-homing layer3 network controller (cluster-manager)\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --webhook-cert-dir=\"/etc/webhook-cert\" \\\n --webhook-host=127.0.0.1 \\\n --webhook-port=9743 \\\n ${ho_enable} \\\n --enable-interconnect \\\n --disable-approver \\\n --extra-allowed-user=\"system:serviceaccount:openshift-ovn-kubernetes:ovn-kubernetes-control-plane\" \\\n --wait-for-kubernetes-api=200s \\\n --pod-admission-conditions=\"/var/run/ovnkube-identity-config/additional-pod-admission-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"2"},{"name":"KUBERNETES_NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-k254v","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}},{"name":"approver","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","command":["/bin/bash","-c","set -xe\nif [[ -f \"/env/_master\" ]]; then\n set -o allexport\n source \"/env/_master\"\n set +o allexport\nfi\n\necho \"I$(date \"+%m%d %H:%M:%S.%N\") - network-node-identity - start approver\"\nexec /usr/bin/ovnkube-identity --k8s-apiserver=https://api-int.sno.openstack.lab:6443 \\\n --disable-webhook \\\n --csr-acceptance-conditions=\"/var/run/ovnkube-identity-config/additional-cert-acceptance-cond.json\" \\\n --loglevel=\"${LOGLEVEL}\"\n"],"env":[{"name":"LOGLEVEL","value":"4"}],"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-k254v","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000550000,"runAsNonRoot":true,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":200,"dnsPolicy":"Default","nodeSelector":{"beta.kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"network-node-identity","serviceAccount":"network-node-identity","nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c23,c22"},"supplementalGroups":[1000550000],"fsGroup":1000550000,"seccompProfile":{"type":"RuntimeDefault"}},"affinity":{"nodeAffinity":{"requiredDuringSchedulingIgnoredDuringExecution":{"nodeSelectorTerms":[{"matchFields":[{"key":"metadata.name","operator":"In","values":["master-0"]}]}]}}},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists"}],"priorityClassName":"system-node-critical","priority":2000001000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:29Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:02Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:28Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:28Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:02Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:07:02Z","containerStatuses":[{"name":"approver","state":{"running":{"startedAt":"2026-03-18T13:10:28Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"t={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-7qqzh\"} reason=\"CSRApproved\"\nI0318 13:07:38.801502 1 approver.go:230] Finished syncing CSR csr-7qqzh for master-0 node in 90.264861ms\nI0318 13:07:38.801601 1 approver.go:230] Finished syncing CSR csr-7qqzh for unknown node in 54.401µs\nI0318 13:07:38.815857 1 approver.go:230] Finished syncing CSR csr-7qqzh for unknown node in 92.043µs\nI0318 13:07:45.001975 1 recorder.go:104] \"CSR \\\"csr-xqh9g\\\" has been approved\" logger=\"events\" type=\"Normal\" object={\"kind\":\"CertificateSigningRequest\",\"name\":\"csr-xqh9g\"} reason=\"CSRApproved\"\nI0318 13:07:45.011792 1 approver.go:230] Finished syncing CSR csr-xqh9g for master-0 node in 10.248991ms\nI0318 13:07:45.011949 1 approver.go:230] Finished syncing CSR csr-xqh9g for unknown node in 79.593µs\nI0318 13:07:45.055478 1 approver.go:230] Finished syncing CSR csr-xqh9g for unknown node in 70.322µs\nE0318 13:09:46.625026 1 leaderelection.go:429] Failed to update lock optimistically: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded, falling back to slow path\nE0318 13:10:01.624762 1 leaderelection.go:436] error retrieving resource lock openshift-network-node-identity/ovnkube-identity: Get \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nI0318 13:10:01.624835 1 leaderelection.go:297] failed to renew lease openshift-network-node-identity/ovnkube-identity: context deadline exceeded\nE0318 13:10:16.625802 1 leaderelection.go:322] Failed to release lock: Put \"https://api-int.sno.openstack.lab:6443/apis/coordination.k8s.io/v1/namespaces/openshift-network-node-identity/leases/ovnkube-identity?timeout=15s\": context deadline exceeded\nF0318 13:10:16.625985 1 ovnkubeidentity.go:309] error running approver: leader election lost\n","startedAt":"2026-03-18T13:07:29Z","finishedAt":"2026-03-18T13:10:16Z","containerID":"cri-o://42763f2e1945cdd442dd148f3b0766793cb775dcfcb2d6ede73f97fce1315683"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://0e76cffa571436858041a59dc3cb08e8f19f5b925a773925f3208413a9e44b8f","started":true,"volumeMounts":[{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-k254v","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"webhook","state":{"running":{"startedAt":"2026-03-18T13:07:29Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2abc1fd79e7781634ed5ed9e8f2b98b9094ea51f40ac3a773c5e5224607bf3d7","containerID":"cri-o://29d359cca5ab3a3d81be3b3e07d8d654046f88e76bc1b8790777c5eda91e3bcc","started":true,"volumeMounts":[{"name":"webhook-cert","mountPath":"/etc/webhook-cert/"},{"name":"env-overrides","mountPath":"/env"},{"name":"ovnkube-identity-cm","mountPath":"/var/run/ovnkube-identity-config"},{"name":"kube-api-access-k254v","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-machine-config-operator/kube-rbac-proxy-crio-master-0.json0000640000000000000000000001521215156522210026251 0ustar0000000000000000{"metadata":{"name":"kube-rbac-proxy-crio-master-0","namespace":"openshift-machine-config-operator","uid":"2c6d3ac2-148a-4bb4-b6f3-32d56158264c","resourceVersion":"4046","creationTimestamp":"2026-03-18T13:06:25Z","labels":{"k8s-app":"kube-rbac-proxy-crio"},"annotations":{"kubernetes.io/config.hash":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.mirror":"1249822f86f23526277d165c0d5d3c19","kubernetes.io/config.seen":"2026-03-18T13:05:42.113241433Z","kubernetes.io/config.source":"file","openshift.io/required-scc":"privileged","openshift.io/scc":"privileged","target.workload.openshift.io/management":"{\"effect\": \"PreferredDuringScheduling\"}"},"ownerReferences":[{"apiVersion":"v1","kind":"Node","name":"master-0","uid":"91c86903-c481-4337-816d-5d4395974319","controller":true}]},"spec":{"volumes":[{"name":"etc-kube","hostPath":{"path":"/etc/kubernetes","type":""}},{"name":"var-lib-kubelet","hostPath":{"path":"/var/lib/kubelet","type":""}}],"initContainers":[{"name":"setup","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","command":["/bin/bash","-ec"],"args":["echo -n \"Waiting for kubelet key and certificate to be available\"\nwhile [ -n \"$(test -e /var/lib/kubelet/pki/kubelet-server-current.pem)\" ] ; do\n echo -n \".\"\n sleep 1\n (( tries += 1 ))\n if [[ \"${tries}\" -gt 10 ]]; then\n echo \"Timed out waiting for kubelet key and cert.\"\n exit 1\n fi\ndone\n"],"resources":{"requests":{"cpu":"5m","memory":"50Mi"}},"volumeMounts":[{"name":"var-lib-kubelet","mountPath":"/var","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"containers":[{"name":"kube-rbac-proxy-crio","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--secure-listen-address=:9637","--config-file=/etc/kubernetes/crio-metrics-proxy.cfg","--client-ca-file=/etc/kubernetes/kubelet-ca.crt","--logtostderr=true","--kubeconfig=/var/lib/kubelet/kubeconfig","--tls-cipher-suites=TLS_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_CHACHA20_POLY1305_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305_SHA256","--tls-min-version=VersionTLS12","--upstream=http://127.0.0.1:9537","--tls-cert-file=/var/lib/kubelet/pki/kubelet-server-current.pem","--tls-private-key-file=/var/lib/kubelet/pki/kubelet-server-current.pem"],"ports":[{"hostPort":9637,"containerPort":9637,"protocol":"TCP"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-kube","readOnly":true,"mountPath":"/etc/kubernetes","mountPropagation":"HostToContainer"},{"name":"var-lib-kubelet","readOnly":true,"mountPath":"/var/lib/kubelet","mountPropagation":"HostToContainer"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"privileged":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeName":"master-0","hostNetwork":true,"securityContext":{},"schedulerName":"default-scheduler","tolerations":[{"operator":"Exists","effect":"NoExecute"},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:11Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:11Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:11Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:11Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:11Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:08:11Z","initContainerStatuses":[{"name":"setup","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:05:48Z","finishedAt":"2026-03-18T13:05:48Z","containerID":"cri-o://869e4216741d6f450122345795f65e862d784b38e4a915e11371713c52cf93a3"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://869e4216741d6f450122345795f65e862d784b38e4a915e11371713c52cf93a3","started":false}],"containerStatuses":[{"name":"kube-rbac-proxy-crio","state":{"running":{"startedAt":"2026-03-18T13:06:40Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"W0318 13:06:09.604681 1 deprecated.go:66] \n==== Removed Flag Warning ======================\n\nlogtostderr is removed in the k8s upstream and has no effect any more.\n\n===============================================\n\t\t\nI0318 13:06:09.604868 1 kube-rbac-proxy.go:530] Reading config file: /etc/kubernetes/crio-metrics-proxy.cfg\nE0318 13:06:09.606648 1 run.go:72] \"command failed\" err=\"failed to load kubeconfig: unable to build rest config based on provided path to kubeconfig file: invalid configuration: [unable to read client-cert /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory, unable to read client-key /var/lib/kubelet/pki/kubelet-client-current.pem for default-auth due to open /var/lib/kubelet/pki/kubelet-client-current.pem: no such file or directory]\"\n","startedAt":"2026-03-18T13:06:09Z","finishedAt":"2026-03-18T13:06:09Z","containerID":"cri-o://0cd8e6f707daec133a61d96c86c0549a9d428fdbed2e6e436300d058f6e9d875"}},"ready":true,"restartCount":3,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://4bd355c34f8aa8d889ca1a40b947fb34311faee6233b1e449a1cc61917522f5b","started":true}],"qosClass":"Burstable"}}config/pod/openshift-ingress-operator/ingress-operator-66b84d69b-xwqsb.json0000640000000000000000000002431515156522210025367 0ustar0000000000000000{"metadata":{"name":"ingress-operator-66b84d69b-xwqsb","generateName":"ingress-operator-66b84d69b-","namespace":"openshift-ingress-operator","uid":"f2b92a53-0b61-4e1d-a306-f9a498e48b38","resourceVersion":"9612","creationTimestamp":"2026-03-18T13:06:18Z","labels":{"name":"ingress-operator","pod-template-hash":"66b84d69b"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.18/23\"],\"mac_address\":\"0a:58:0a:80:00:12\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.18/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.18\"\n ],\n \"mac\": \"0a:58:0a:80:00:12\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"ingress-operator-66b84d69b","uid":"68cdde03-f674-419f-aff4-4fcf4c9af166","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"metrics-tls","secret":{"secretName":"metrics-tls","defaultMode":420}},{"name":"trusted-ca","configMap":{"name":"trusted-ca","items":[{"key":"ca-bundle.crt","path":"tls-ca-bundle.pem"}],"defaultMode":420}},{"name":"bound-sa-token","projected":{"sources":[{"serviceAccountToken":{"audience":"openshift","expirationSeconds":3600,"path":"token"}}],"defaultMode":420}},{"name":"kube-api-access-j5mgr","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"containers":[{"name":"ingress-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","command":["ingress-operator","start","--namespace","$(WATCH_NAMESPACE)","--image","$(IMAGE)","--canary-image","$(CANARY_IMAGE)","--release-version","$(RELEASE_VERSION)"],"env":[{"name":"RELEASE_VERSION","value":"4.18.35"},{"name":"WATCH_NAMESPACE","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}},{"name":"IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"CANARY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"resources":{"requests":{"cpu":"10m","memory":"56Mi"}},"volumeMounts":[{"name":"trusted-ca","readOnly":true,"mountPath":"/etc/pki/ca-trust/extracted/pem"},{"name":"bound-sa-token","readOnly":true,"mountPath":"/var/run/secrets/openshift/serviceaccount"},{"name":"kube-api-access-j5mgr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}},{"name":"kube-rbac-proxy","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","args":["--logtostderr","--secure-listen-address=:9393","--tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_RSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256","--upstream=http://127.0.0.1:60000/","--tls-cert-file=/etc/tls/private/tls.crt","--tls-private-key-file=/etc/tls/private/tls.key"],"ports":[{"name":"metrics","containerPort":9393,"protocol":"TCP"}],"resources":{"requests":{"cpu":"10m","memory":"40Mi"}},"volumeMounts":[{"name":"metrics-tls","readOnly":true,"mountPath":"/etc/tls/private"},{"name":"kube-api-access-j5mgr","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000140000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"ingress-operator","serviceAccount":"ingress-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c12,c4"},"runAsNonRoot":true,"fsGroup":1000140000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:46Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:49Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:49Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:10:49Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.18","podIPs":[{"ip":"10.128.0.18"}],"startTime":"2026-03-18T13:07:49Z","containerStatuses":[{"name":"ingress-operator","state":{"running":{"startedAt":"2026-03-18T13:10:48Z"}},"lastState":{"terminated":{"exitCode":1,"reason":"Error","message":"runtime/pkg/cache/internal/informers.go:106: watch of *v1.IngressController ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0318 13:10:47.723636 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Secret ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0318 13:10:47.723715 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.ConfigMap ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0318 13:10:47.723771 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.Secret ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\nW0318 13:10:47.723825 1 reflector.go:484] sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106: watch of *v1.ConfigMap ended with: an error on the server (\"unable to decode an event from the watch stream: context canceled\") has prevented the request from succeeding\n2026-03-18T13:10:47.723Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for webhooks\n2026-03-18T13:10:47.724Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tStopping and waiting for HTTP servers\n2026-03-18T13:10:47.725Z\tINFO\toperator.init.controller-runtime.metrics\truntime/asm_amd64.s:1695\tShutting down metrics server with timeout of 1 minute\n2026-03-18T13:10:47.725Z\tINFO\toperator.init\truntime/asm_amd64.s:1695\tWait completed, proceeding to shutdown the manager\n2026-03-18T13:10:47.730Z\tERROR\toperator.main\tcobra/command.go:989\terror starting\t{\"error\": \"failed to wait for canary_controller caches to sync: timed out waiting for cache to be synced for Kind *v1.Route\"}\n","startedAt":"2026-03-18T13:08:46Z","finishedAt":"2026-03-18T13:10:47Z","containerID":"cri-o://bd4c65659cdaf88672c351e368deda39b10476e44f4e0b79ea5e5dab975cb22c"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098","containerID":"cri-o://737b35288b477956960fa12cc79eb83b193b7b471646ce5af1a3aaef15a0e026","started":true,"volumeMounts":[{"name":"trusted-ca","mountPath":"/etc/pki/ca-trust/extracted/pem","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"bound-sa-token","mountPath":"/var/run/secrets/openshift/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-j5mgr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"kube-rbac-proxy","state":{"running":{"startedAt":"2026-03-18T13:08:46Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed","containerID":"cri-o://102aa84e4ce3e9436d0ca2ee9b9c8c9afea22715024408b5fc879ac8323a8114","started":true,"volumeMounts":[{"name":"metrics-tls","mountPath":"/etc/tls/private","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access-j5mgr","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/pod/openshift-cluster-olm-operator/cluster-olm-operator-67dcd4998-cwpkz.json0000640000000000000000000002541315156522210026760 0ustar0000000000000000{"metadata":{"name":"cluster-olm-operator-67dcd4998-cwpkz","generateName":"cluster-olm-operator-67dcd4998-","namespace":"openshift-cluster-olm-operator","uid":"16a930da-d793-486f-bcef-cf042d3c427d","resourceVersion":"5249","creationTimestamp":"2026-03-18T13:06:17Z","labels":{"name":"cluster-olm-operator","pod-template-hash":"67dcd4998"},"annotations":{"k8s.ovn.org/pod-networks":"{\"default\":{\"ip_addresses\":[\"10.128.0.19/23\"],\"mac_address\":\"0a:58:0a:80:00:13\",\"gateway_ips\":[\"10.128.0.1\"],\"routes\":[{\"dest\":\"10.128.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"172.30.0.0/16\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"169.254.0.5/32\",\"nextHop\":\"10.128.0.1\"},{\"dest\":\"100.64.0.0/16\",\"nextHop\":\"10.128.0.1\"}],\"ip_address\":\"10.128.0.19/23\",\"gateway_ip\":\"10.128.0.1\",\"role\":\"primary\"}}","k8s.v1.cni.cncf.io/network-status":"[{\n \"name\": \"ovn-kubernetes\",\n \"interface\": \"eth0\",\n \"ips\": [\n \"10.128.0.19\"\n ],\n \"mac\": \"0a:58:0a:80:00:13\",\n \"default\": true,\n \"dns\": {}\n}]","openshift.io/required-scc":"restricted-v2","openshift.io/scc":"restricted-v2","seccomp.security.alpha.kubernetes.io/pod":"runtime/default"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-olm-operator-67dcd4998","uid":"037fcef9-edeb-44d2-92c0-07cd25962818","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"cluster-olm-operator-serving-cert","secret":{"secretName":"cluster-olm-operator-serving-cert","defaultMode":420,"optional":true}},{"name":"operand-assets","emptyDir":{}},{"name":"kube-api-access-5gv8b","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3607,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}},{"configMap":{"name":"openshift-service-ca.crt","items":[{"key":"service-ca.crt","path":"service-ca.crt"}]}}],"defaultMode":420}}],"initContainers":[{"name":"copy-catalogd-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/catalogd"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-5gv8b","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000340000,"allowPrivilegeEscalation":false}},{"name":"copy-operator-controller-manifests","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","command":["/bin/sh"],"args":["-c","cp -a /openshift/manifests /operand-assets/operator-controller"],"resources":{},"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-5gv8b","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000340000,"allowPrivilegeEscalation":false}}],"containers":[{"name":"cluster-olm-operator","image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","command":["/cluster-olm-operator"],"args":["start"],"ports":[{"name":"metrics","containerPort":8443,"protocol":"TCP"}],"env":[{"name":"OPERATOR_NAME","value":"cluster-olm-operator"},{"name":"OPERATOR_IMAGE_VERSION","value":"4.18.35"},{"name":"KUBE_RBAC_PROXY_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"CATALOGD_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85"},{"name":"OPERATOR_CONTROLLER_IMAGE","value":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023"}],"resources":{"requests":{"cpu":"10m","memory":"20Mi"}},"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-5gv8b","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["ALL"]},"runAsUser":1000340000,"allowPrivilegeEscalation":false}}],"restartPolicy":"Always","terminationGracePeriodSeconds":30,"dnsPolicy":"ClusterFirst","nodeSelector":{"kubernetes.io/os":"linux","node-role.kubernetes.io/master":""},"serviceAccountName":"cluster-olm-operator","serviceAccount":"cluster-olm-operator","nodeName":"master-0","securityContext":{"seLinuxOptions":{"level":"s0:c18,c17"},"runAsNonRoot":true,"fsGroup":1000340000,"seccompProfile":{"type":"RuntimeDefault"}},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:12Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:21Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:29Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:29Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:07:48Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"10.128.0.19","podIPs":[{"ip":"10.128.0.19"}],"startTime":"2026-03-18T13:07:48Z","initContainerStatuses":[{"name":"copy-catalogd-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:08:15Z","finishedAt":"2026-03-18T13:08:16Z","containerID":"cri-o://7c8f77a7d65f8fc3bc4cbe1de5c1b2400c99f286cccd6e89e58de1418e09f721"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:3062f6485aec4770e60852b535c69a42527b305161fe856499c8658ead6d1e85","containerID":"cri-o://7c8f77a7d65f8fc3bc4cbe1de5c1b2400c99f286cccd6e89e58de1418e09f721","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-5gv8b","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]},{"name":"copy-operator-controller-manifests","state":{"terminated":{"exitCode":0,"reason":"Completed","startedAt":"2026-03-18T13:08:21Z","finishedAt":"2026-03-18T13:08:21Z","containerID":"cri-o://aa564c30adb5b4df8107a74993a455b716489617f02c382f60c47021de96afac"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:4b5ea1ef4e09b673a0c68c8848ca162ab11d9ac373a377daa52dea702ffa3023","containerID":"cri-o://aa564c30adb5b4df8107a74993a455b716489617f02c382f60c47021de96afac","started":false,"volumeMounts":[{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-5gv8b","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"containerStatuses":[{"name":"cluster-olm-operator","state":{"running":{"startedAt":"2026-03-18T13:08:28Z"}},"lastState":{"terminated":{"exitCode":255,"reason":"Error","message":"W0318 13:08:27.268723 1 cmd.go:254] Using insecure, self-signed certificates\nI0318 13:08:27.628826 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.\nI0318 13:08:27.631039 1 observer_polling.go:159] Starting file observer\nI0318 13:08:27.631142 1 observer_polling.go:120] Observed file \"/var/run/secrets/serving-cert/tls.crt\" has been modified (old=\"\", new=\"d11b17a6f46ecb2a4c917583d8d0deaec45d87a37c60244c4daa8c6166f0a9b6\")\nW0318 13:08:27.631163 1 builder.go:154] Restart triggered because of file /var/run/secrets/serving-cert/tls.crt was modified\nI0318 13:08:27.631205 1 observer_polling.go:120] Observed file \"/var/run/secrets/serving-cert/tls.key\" has been modified (old=\"\", new=\"ec6fdb8e2894399e04d91d7f9f16cbb591309b6a6cf3b37ac83abd50cd60aba4\")\nW0318 13:08:27.631272 1 builder.go:266] unable to get owner reference (falling back to namespace): Get \"https://172.30.0.1:443/api/v1/namespaces/openshift-cluster-olm-operator/pods\": context canceled\nI0318 13:08:27.631382 1 builder.go:298] cluster-olm-operator version 4.18.0-202602261953.p2.g88088e4.assembly.stream.el9-88088e4-88088e4bfe9f55ea7ab2c4331cebee727c8c0c34\nF0318 13:08:28.159960 1 cmd.go:179] failed checking apiserver connectivity: client rate limiter Wait returned an error: context canceled\n","startedAt":"2026-03-18T13:08:27Z","finishedAt":"2026-03-18T13:08:28Z","containerID":"cri-o://05341255eca6050db7cb2260fb5dd7a45d91c7026314e974f2c6b81b9259883f"}},"ready":true,"restartCount":1,"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","imageID":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:adb9f6f2fd701863c7caed747df43f83d3569ba9388cfa33ea7219ac6a606b11","containerID":"cri-o://3683163827a4edece2407b15e519e57ed5810d9901b275e4063ae3e6c8a46a7c","started":true,"volumeMounts":[{"name":"cluster-olm-operator-serving-cert","mountPath":"/var/run/secrets/serving-cert"},{"name":"operand-assets","mountPath":"/operand-assets"},{"name":"kube-api-access-5gv8b","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/configmaps/kube-system/cluster-config-v1/install-config0000640000000000000000000000155515156522210023214 0ustar0000000000000000apiVersion: v1 baseDomain: xxxxxxxxxxxxx compute: - hyperthreading: Enabled name: worker platform: {} replicas: 0 controlPlane: hyperthreading: Enabled name: master platform: {} replicas: 1 metadata: creationTimestamp: null name: sno networking: clusterNetwork: - cidr: 10.128.0.0/16 hostPrefix: 23 machineNetwork: - cidr: 192.168.32.0/24 networkType: OVNKubernetes serviceNetwork: - 172.30.0.0/16 platform: none: {} publish: External pullSecret: "" sshKey: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx config/configmaps/openshift-config/openshift-service-ca.crt/service-ca.crt0000640000000000000000000000010115156522210025424 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/openshift-install-manifests/version0000640000000000000000000000000715156522210025133 0ustar0000000000000000v4.18.0config/configmaps/openshift-config/openshift-install-manifests/invoker0000640000000000000000000000001715156522210025124 0ustar0000000000000000agent-installerconfig/configmaps/openshift-config/kube-root-ca.crt/ca.crt0000640000000000000000000000060615156522210022252 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/initial-kube-apiserver-server-ca/ca-bundle.crt0000640000000000000000000000050515156522210026700 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-serving-ca/ca-bundle.crt0000640000000000000000000000010115156522210023403 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/etcd-ca-bundle/ca-bundle.crt0000640000000000000000000000010115156522210023177 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/configmaps/openshift-config/admin-kubeconfig-client-ca/ca-bundle.crt0000640000000000000000000000010115156522210025467 0ustar0000000000000000-----BEGIN CERTIFICATE----- ANONYMIZED -----END CERTIFICATE----- config/clusteroperator/storage.json0000640000000000000000000000346615156522210016311 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"storage","uid":"049b040d-52ed-4ed2-a7d7-82a483f87719","resourceVersion":"9872","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"Storage","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected","message":"DefaultStorageClassControllerAvailable: No default StorageClass for this platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"","resource":"namespaces","name":"openshift-cluster-csi-drivers"},{"group":"operator.openshift.io","resource":"storages","name":"cluster"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"cluster-storage-operator-role"}],"extension":null}}config/clusteroperator/service-ca.json0000640000000000000000000000340315156522210016655 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"service-ca","uid":"b6ed1755-a63d-4c4c-be90-f8491c8013b3","resourceVersion":"4481","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:18Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:08:21Z","reason":"AsExpected","message":"Progressing: All service-ca-operator deployments updated"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:08:20Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:20Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:17Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"servicecas","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-service-ca-operator"},{"group":"","resource":"namespaces","name":"openshift-service-ca"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-packageserver.json0000640000000000000000000000252415156522210024657 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-packageserver","uid":"12c710c2-526a-4b0d-a8bd-7a04e7c76404","resourceVersion":"7544","generation":1,"creationTimestamp":"2026-03-18T13:01:59Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:09:03Z","message":"Working toward 0.0.1-snapshot"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:09:04Z","message":"Safe to upgrade"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"},{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager-catalog.json0000640000000000000000000000255515156522210023453 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager-catalog","uid":"7b4a9d30-6adc-4e87-adf3-b0f89d9a6929","resourceVersion":"8417","generation":1,"creationTimestamp":"2026-03-18T13:01:59Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:10:28Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:09:03Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-operator-lifecycle-manager"}],"extension":null}}config/clusteroperator/operator-lifecycle-manager.json0000640000000000000000000000264115156522210022037 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"operator-lifecycle-manager","uid":"babc21a7-535b-47a8-8202-52015c5463fd","resourceVersion":"7422","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:09:03Z","message":"Deployed 4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:09:03Z"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"operator-lifecycle-manager","version":"4.18.0-202602261953.p2.gc2df9e7.assembly.stream.el9-c2df9e7"}],"relatedObjects":[{"group":"operators.coreos.com","resource":"clusterserviceversions","namespace":"openshift-operator-lifecycle-manager","name":"packageserver"}],"extension":null}}config/clusteroperator/openshift-samples.json0000640000000000000000000000173315156522210020301 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-samples","uid":"0e1beb85-7806-4c17-a0a1-dc9faff7d13c","resourceVersion":"807","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"openshift-samples","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"samples.operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-samples-operator"},{"group":"template.openshift.io","resource":"templates","namespace":"openshift","name":""},{"group":"image.openshift.io","resource":"imagestreams","namespace":"openshift","name":""}],"extension":null}}config/clusteroperator/openshift-controller-manager.json0000640000000000000000000000346115156522210022430 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-controller-manager","uid":"2e221d4e-8ad9-4b4e-a35e-69ee153391f4","resourceVersion":"9977","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:26Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:06Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:06Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:26Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftcontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-controller-manager-operator"},{"group":"","resource":"namespaces","name":"openshift-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-route-controller-manager"}],"extension":null}}config/clusteroperator/openshift-apiserver.json0000640000000000000000000001216215156522210020633 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"openshift-apiserver","uid":"8aaec3ff-575f-4803-a952-294e332d4da6","resourceVersion":"9958","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:29Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:10:33Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:08:33Z","reason":"APIServices_Error","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.apps.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/apps.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/apps.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.authorization.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/authorization.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.build.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/build.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/build.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.image.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/image.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/image.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.project.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/project.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/project.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.quota.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/quota.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/quota.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.route.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/route.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/route.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.security.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/security.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/security.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.template.openshift.io: not available: failing or missing response from https://10.128.0.41:8443/apis/template.openshift.io/v1: bad status from https://10.128.0.41:8443/apis/template.openshift.io/v1: 401"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:29Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:29Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"openshift-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"openshiftapiservers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-apiserver"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"endpoints","namespace":"openshift-etcd","name":"host-etcd-2"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-apiserver","name":""},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.apps.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.authorization.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.build.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.image.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.project.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.quota.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.route.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.security.openshift.io"},{"group":"apiregistration.k8s.io","resource":"apiservices","name":"v1.template.openshift.io"}],"extension":null}}config/clusteroperator/olm.json0000640000000000000000000001420515156522210015425 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"olm","uid":"387045e6-67dc-4530-94fd-df862a9d18be","resourceVersion":"10104","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManagerV1","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:29Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:09:05Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:09:05Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:29Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:29Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-catalogd"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clustercatalogs.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-catalogd","name":"catalogd-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"catalogd-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-catalogd","name":"catalogd-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"catalogd-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-catalogd","name":"catalogd-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-catalogd","name":"catalogd-service"},{"group":"apps","resource":"deployments","namespace":"openshift-catalogd","name":"catalogd-controller-manager"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-certified-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-community-operators"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-marketplace"},{"group":"olm.operatorframework.io","resource":"clustercatalogs","name":"openshift-redhat-operators"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":"catalogd-mutating-webhook-configuration"},{"group":"","resource":"namespaces","name":"openshift-operator-controller"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusterextensions.olm.operatorframework.io"},{"group":"","resource":"serviceaccounts","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-role"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-operator-controller","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-clusterextension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-editor-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-extension-viewer-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-manager-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-metrics-reader"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"operator-controller-proxy-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-leader-election-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-operator-controller","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-manager-rolebinding"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"operator-controller-proxy-rolebinding"},{"group":"","resource":"configmaps","namespace":"openshift-operator-controller","name":"operator-controller-trusted-ca-bundle"},{"group":"","resource":"services","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager-metrics-service"},{"group":"apps","resource":"deployments","namespace":"openshift-operator-controller","name":"operator-controller-controller-manager"},{"group":"operator.openshift.io","resource":"olms","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cluster-olm-operator"}],"extension":null}}config/clusteroperator/node-tuning.json0000640000000000000000000000342115156522210017063 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"node-tuning","uid":"869f2cce-db02-4f9e-a389-637bbdf88b89","resourceVersion":"6847","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:08:48Z","reason":"AsExpected","message":"Cluster has deployed 1/1 \"4.18.35\" operands"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:08:50Z","reason":"AsExpected","message":"Cluster version is \"4.18.35\""},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:47Z","reason":"AsExpected","message":"DaemonSet \"tuned\" available"}],"versions":[{"name":"ocp-tuned","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-node-tuning-operator"},{"group":"tuned.openshift.io","resource":"profiles","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"tuned.openshift.io","resource":"tuneds","namespace":"openshift-cluster-node-tuning-operator","name":""},{"group":"apps","resource":"daemonsets","namespace":"openshift-cluster-node-tuning-operator","name":"tuned"},{"group":"performance.openshift.io","resource":"performanceprofiles","name":""}],"extension":null}}config/clusteroperator/network.json0000640000000000000000000003615415156522210016336 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"network","uid":"acae3d9a-c08b-4584-a6fd-04ee5e6c31e0","resourceVersion":"7580","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","network.operator.openshift.io/last-seen-state":"{\"DaemonsetStates\":[],\"DeploymentStates\":[],\"StatefulsetStates\":[]}","network.operator.openshift.io/relatedClusterObjects":""},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"ManagementStateDegraded","status":"False","lastTransitionTime":"2026-03-18T13:06:45Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:06:30Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:06:30Z"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:09:05Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:08:05Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"applied-cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"network-attachment-definitions.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ippools.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"overlappingrangeipreservations.whereabouts.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"nodeslicepools.whereabouts.cni.cncf.io"},{"group":"","resource":"namespaces","name":"openshift-multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-ancillary-tools"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-transient"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-group"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-ancillary-tools"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-cluster-readers"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"multus-whereabouts"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"whereabouts-cni"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"net-attach-def-project"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"default-cni-sysctl-allowlist"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"cni-copy-resources"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"whereabouts-flatfile-config"},{"group":"","resource":"configmaps","namespace":"openshift-multus","name":"multus-daemon-config"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"multus-additional-cni-plugins"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"metrics-daemon-sa"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"metrics-daemon-role"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"metrics-daemon-sa-rolebinding"},{"group":"apps","resource":"daemonsets","namespace":"openshift-multus","name":"network-metrics-daemon"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-network"},{"group":"","resource":"services","namespace":"openshift-multus","name":"network-metrics-service"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"","resource":"services","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"","resource":"serviceaccounts","namespace":"openshift-multus","name":"multus-ac"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"multus-admission-controller-webhook"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"multus-admission-controller-webhook"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"multus.openshift.io"},{"group":"apps","resource":"deployments","namespace":"openshift-multus","name":"multus-admission-controller"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-multus","name":"monitor-multus-admission-controller"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-multus","name":"prometheus-k8s"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-multus","name":"prometheus-k8s-rules"},{"group":"","resource":"namespaces","name":"openshift-ovn-kubernetes"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressfirewalls.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressips.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressqoses.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminpolicybasedexternalroutes.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"egressservices.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"adminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"baselineadminnetworkpolicies.policy.networking.k8s.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"ipamclaims.k8s.cni.cncf.io"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"userdefinednetworks.k8s.ovn.org"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":"clusteruserdefinednetworks.k8s.ovn.org"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-nodes-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-node-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-identity-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-kube-rbac-proxy"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-node-kube-rbac-proxy"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-config"},{"group":"","resource":"serviceaccounts","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"openshift-ovn-kubernetes-control-plane-limited"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"ovn"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-ovn-kubernetes","name":"signer"},{"group":"flowcontrol.apiserver.k8s.io","resource":"flowschemas","name":"openshift-ovn-kubernetes"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-cluster-reader"},{"group":"","resource":"configmaps","namespace":"openshift-ovn-kubernetes","name":"ovnkube-script-lib"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-editor"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-ovn-kubernetes-udn-viewer"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"master-rules"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-ovn-kubernetes","name":"networking-rules"},{"group":"","resource":"configmaps","namespace":"openshift-config-managed","name":"openshift-network-features"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-control-plane-metrics"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-control-plane"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-ovn-kubernetes","name":"monitor-ovn-node"},{"group":"","resource":"services","namespace":"openshift-ovn-kubernetes","name":"ovn-kubernetes-node"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-ovn-kubernetes","name":"prometheus-k8s"},{"group":"","resource":"namespaces","name":"openshift-host-network"},{"group":"","resource":"resourcequotas","namespace":"openshift-host-network","name":"host-network-namespace-quotas"},{"group":"apps","resource":"deployments","namespace":"openshift-ovn-kubernetes","name":"ovnkube-control-plane"},{"group":"apps","resource":"daemonsets","namespace":"openshift-ovn-kubernetes","name":"ovnkube-node"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicies","name":"user-defined-networks-namespace-label"},{"group":"admissionregistration.k8s.io","resource":"validatingadmissionpolicybindings","name":"user-defined-networks-namespace-label-binding"},{"group":"","resource":"namespaces","name":"openshift-network-diagnostics"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-diagnostics"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"kube-system","name":"network-diagnostics"},{"group":"apps","resource":"deployments","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"monitoring.coreos.com","resource":"servicemonitors","namespace":"openshift-network-diagnostics","name":"network-check-source"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-diagnostics","name":"prometheus-k8s"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"","resource":"services","namespace":"openshift-network-diagnostics","name":"network-check-target"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-config-managed","name":"openshift-network-public-role"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-config-managed","name":"openshift-network-public-role-binding"},{"group":"","resource":"namespaces","name":"openshift-network-node-identity"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"network-node-identity"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-network-node-identity","name":"network-node-identity-leases"},{"group":"rbac.authorization.k8s.io","resource":"rolebindings","namespace":"openshift-network-node-identity","name":"system:openshift:scc:hostnetwork-v2"},{"group":"","resource":"configmaps","namespace":"openshift-network-node-identity","name":"ovnkube-identity-cm"},{"group":"network.operator.openshift.io","resource":"operatorpkis","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":"network-node-identity.openshift.io"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-node-identity","name":"network-node-identity"},{"group":"monitoring.coreos.com","resource":"prometheusrules","namespace":"openshift-network-operator","name":"openshift-network-operator-ipsec-rules"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"openshift-iptables-alerter"},{"group":"","resource":"serviceaccounts","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"rbac.authorization.k8s.io","resource":"clusterrolebindings","name":"openshift-iptables-alerter"},{"group":"","resource":"configmaps","namespace":"openshift-network-operator","name":"iptables-alerter-script"},{"group":"apps","resource":"daemonsets","namespace":"openshift-network-operator","name":"iptables-alerter"},{"group":"","resource":"namespaces","name":"openshift-network-operator"},{"group":"operator.openshift.io","resource":"networks","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-cloud-network-config-controller"}],"extension":null}}config/clusteroperator/monitoring.json0000640000000000000000000000333715156522210017027 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"monitoring","uid":"c9ed7c35-62a2-4f40-9544-4e5db833eaf4","resourceVersion":"7287","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"Unknown","lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"Degraded","status":"Unknown","lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:09:03Z","reason":"RollOutInProgress","message":"Rolling out the stack."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:09:03Z"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-monitoring"},{"group":"","resource":"namespaces","name":"openshift-user-workload-monitoring"},{"group":"monitoring.coreos.com","resource":"servicemonitors","name":""},{"group":"monitoring.coreos.com","resource":"podmonitors","name":""},{"group":"monitoring.coreos.com","resource":"prometheusrules","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagers","name":""},{"group":"monitoring.coreos.com","resource":"prometheuses","name":""},{"group":"monitoring.coreos.com","resource":"thanosrulers","name":""},{"group":"monitoring.coreos.com","resource":"alertmanagerconfigs","name":""}],"extension":null}}config/clusteroperator/marketplace.json0000640000000000000000000000313315156522210017124 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"marketplace","uid":"e9e40415-6808-47be-a00c-7440c171aea1","resourceVersion":"7468","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"marketplace","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:09:04Z","reason":"OperatorAvailable","message":"Successfully progressed to release version: 4.18.35"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:09:04Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:09:04Z","reason":"OperatorAvailable","message":"Marketplace is upgradeable"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:09:04Z","reason":"OperatorAvailable","message":"Available release version: 4.18.35"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-marketplace"},{"group":"operators.coreos.com","resource":"catalogsources","namespace":"openshift-marketplace","name":""}],"extension":null}}config/clusteroperator/machine-config.json0000640000000000000000000000230015156522210017476 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-config","uid":"7092b4b9-e3db-482b-ad7b-ef5018324e54","resourceVersion":"796","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-config-operator"},{"group":"machineconfiguration.openshift.io","resource":"machineconfigpools","name":""},{"group":"machineconfiguration.openshift.io","resource":"controllerconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"machineconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"kubeletconfigs","name":""},{"group":"machineconfiguration.openshift.io","resource":"containerruntimeconfigs","name":""},{"group":"","resource":"nodes","name":""}],"extension":null}}config/clusteroperator/machine-approver.json0000640000000000000000000000253215156522210020076 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-approver","uid":"908a63fe-922a-46b1-8f17-2974c65da552","resourceVersion":"9782","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:10:59Z","reason":"AsExpected","message":"Cluster Machine Approver is available at 4.18.35"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:10:59Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:10:59Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:10:59Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-machine-approver"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""}],"extension":null}}config/clusteroperator/machine-api.json0000640000000000000000000000371415156522210017014 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"machine-api","uid":"d1f44bc7-1f60-4ed0-99d5-0935f274ce88","resourceVersion":"10540","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:35Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:35Z","reason":"AsExpected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:35Z","reason":"AsExpected","message":"Cluster Machine API Operator is in NoOp mode"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:35Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"machines","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinesets","namespace":"openshift-machine-api","name":""},{"group":"machine.openshift.io","resource":"machinehealthchecks","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"roles","namespace":"openshift-machine-api","name":""},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-operator"},{"group":"rbac.authorization.k8s.io","resource":"clusterroles","name":"machine-api-controllers"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/kube-storage-version-migrator.json0000640000000000000000000000325315156522210022534 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-storage-version-migrator","uid":"6f719a74-f5e4-45e2-aea0-3c588110f3c9","resourceVersion":"9955","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:28Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:08:46Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:08:46Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:28Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:28Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubestorageversionmigrators","name":"cluster"},{"group":"migration.k8s.io","resource":"storageversionmigrations","name":""},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator"},{"group":"","resource":"namespaces","name":"openshift-kube-storage-version-migrator-operator"}],"extension":null}}config/clusteroperator/kube-scheduler.json0000640000000000000000000000415615156522210017544 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-scheduler","uid":"56525707-d3a6-4768-bc4b-a1c63d1881fc","resourceVersion":"7548","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:19Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:08:37Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:08:20Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 4"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:19Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:18Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeschedulers","name":"cluster"},{"group":"config.openshift.io","resource":"schedulers","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler"},{"group":"","resource":"namespaces","name":"openshift-kube-scheduler-operator"},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""}],"extension":null}}config/clusteroperator/kube-controller-manager.json0000640000000000000000000000427715156522210021365 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-controller-manager","uid":"0f92d443-0fec-41e5-8023-2b3db296cbbb","resourceVersion":"8004","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:18Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:08:57Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:08:19Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 2"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:18Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:18Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubecontrollermanagers","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-kube-controller-manager-operator"},{"group":"","resource":"namespaces","name":"kube-system"},{"group":"certificates.k8s.io","resource":"certificatesigningrequests","name":""},{"group":"","resource":"nodes","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/kube-apiserver.json0000640000000000000000000000517715156522210017572 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"kube-apiserver","uid":"7fdcfcf3-634d-429b-bb68-5db777ae928b","resourceVersion":"6879","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:02Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:08:51Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:08:05Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:02Z","reason":"AsExpected","message":"KubeletMinorVersionUpgradeable: Kubelet and API server minor versions are synced."},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-18T13:08:02Z","reason":"AsExpected","message":"All is well"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"kubeapiservers","name":"cluster"},{"group":"apiextensions.k8s.io","resource":"customresourcedefinitions","name":""},{"group":"security.openshift.io","resource":"securitycontextconstraints","name":""},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver-operator"},{"group":"","resource":"namespaces","name":"openshift-kube-apiserver"},{"group":"admissionregistration.k8s.io","resource":"mutatingwebhookconfigurations","name":""},{"group":"admissionregistration.k8s.io","resource":"validatingwebhookconfigurations","name":""},{"group":"controlplane.operator.openshift.io","resource":"podnetworkconnectivitychecks","namespace":"openshift-kube-apiserver","name":""},{"group":"apiserver.openshift.io","resource":"apirequestcounts","name":""},{"group":"config.openshift.io","resource":"nodes","name":"cluster"}],"extension":null}}config/clusteroperator/insights.json0000640000000000000000000000534115156522210016467 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"insights","uid":"dbb94eb7-73db-4fdc-88b3-00a7bff8f8d7","resourceVersion":"10542","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"Insights","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:35Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"ClusterTransferAvailable","status":"Unknown","lastTransitionTime":"2026-03-18T13:11:35Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:35Z","reason":"AsExpected","message":"Insights works as expected"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-18T13:11:35Z","reason":"AsExpected"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:35Z","reason":"AsExpected","message":"Monitoring the cluster"},{"type":"RemoteConfigurationAvailable","status":"True","lastTransitionTime":"2026-03-18T13:11:35Z","reason":"AsExpected"},{"type":"RemoteConfigurationValid","status":"True","lastTransitionTime":"2026-03-18T13:11:35Z","reason":"AsExpected"},{"type":"SCAAvailable","status":"Unknown","lastTransitionTime":"2026-03-18T13:11:35Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:35Z","reason":"InsightsUpgradeable","message":"Insights operator can be upgraded"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-insights"},{"group":"apps","resource":"deployments","namespace":"openshift-insights","name":"insights-operator"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"pull-secret"},{"group":"","resource":"secrets","namespace":"openshift-config","name":"support"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"gather"},{"group":"","resource":"serviceaccounts","namespace":"openshift-insights","name":"operator"},{"group":"","resource":"services","namespace":"openshift-insights","name":"metrics"},{"group":"","resource":"configmaps","namespace":"openshift-insights","name":"service-ca-bundle"},{"group":"operator.openshift.io","resource":"insightsoperators","name":"cluster"}],"extension":{"lastReportTime":null}}}config/clusteroperator/ingress.json0000640000000000000000000000456715156522210016322 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"ingress","uid":"1ac32686-f39a-4b1e-b33a-1b52ccb512f1","resourceVersion":"6789","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"Ingress","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:08:49Z","reason":"IngressAvailable","message":"The \"default\" ingress controller reports Available=True."},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:08:47Z","reason":"Reconciling","message":"ingresscontroller \"default\" is progressing: IngressControllerProgressing: One or more status conditions indicate progressing: DeploymentRollingOut=True (DeploymentRollingOut: Waiting for router deployment rollout to finish: 0 of 1 updated replica(s) are available...\n)."},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:48Z","reason":"IngressNotDegraded","message":"The \"default\" ingress controller reports Degraded=False."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:47Z","reason":"Upgradeable"},{"type":"EvaluationConditionsDetected","status":"False","lastTransitionTime":"2026-03-18T13:08:47Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"ingress-controller","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:002dfb86e17ad8f5cc232a7d2dce183b23335c8ecb7e7d31dcf3e4446b390777"},{"name":"canary-server","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:77fff570657d2fa0bfb709b2c8b6665bae0bf90a2be981d8dbca56c674715098"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-ingress-operator"},{"group":"operator.openshift.io","resource":"ingresscontrollers","namespace":"openshift-ingress-operator","name":""},{"group":"ingress.operator.openshift.io","resource":"dnsrecords","namespace":"openshift-ingress-operator","name":""},{"group":"","resource":"namespaces","name":"openshift-ingress"}],"extension":null}}config/clusteroperator/image-registry.json0000640000000000000000000000132715156522210017567 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"image-registry","uid":"e0550081-b823-4330-ad0d-d1bdf2cac9ba","resourceVersion":"809","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"ImageRegistry","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/etcd.json0000640000000000000000000000437715156522210015566 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"etcd","uid":"31b11557-81ce-468c-9fbe-cc75dc0375f6","resourceVersion":"8226","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:19Z","reason":"AsExpected","message":"NodeControllerDegraded: All master nodes are ready\nEtcdEndpointsDegraded: failed to get member list: giving up getting a cached client after 3 tries\nEtcdMembersDegraded: No unhealthy members found\nBootstrapTeardownDegraded: error while updating BootstrapAlreadyRemoved: Operation cannot be fulfilled on etcds.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:08:45Z","reason":"NodeInstaller","message":"NodeInstallerProgressing: 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:08:21Z","reason":"StaticPods_ZeroNodesActive","message":"StaticPodsAvailable: 0 nodes are active; 1 node is at revision 0; 0 nodes have achieved new revision 1"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:19Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:18Z","reason":"NoData"}],"versions":[{"name":"raw-internal","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"etcds","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-etcd-operator"},{"group":"","resource":"namespaces","name":"openshift-etcd"}],"extension":null}}config/clusteroperator/dns.json0000640000000000000000000000365515156522210015431 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"dns","uid":"cf8c7f7b-9afa-4294-884b-b8816d33c4e3","resourceVersion":"9975","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:10Z","reason":"AsExpected","message":"DNS \"default\" is available."},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:08:48Z","reason":"AsExpected","message":"Desired and current number of DNSes are equal"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:10Z","reason":"DNSNotDegraded"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:47Z","reason":"DNSUpgradeable","message":"DNS default is upgradeable: DNS Operator can be upgraded"}],"versions":[{"name":"kube-rbac-proxy","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d12d0dc7eb86bbedf6b2d7689a28fd51f0d928f720e4a6783744304297c661ed"},{"name":"operator","version":"4.18.35"},{"name":"coredns","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:2c4d5a681595e428ff4b5083648c13615eed80be9084a3d3fc68a0295079cb12"},{"name":"openshift-cli","version":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:c6a4383333a1fd6d05c3f60ec793913f7937ee3d77f002d85e6c61e20507bf55"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-dns-operator"},{"group":"operator.openshift.io","resource":"dnses","name":"default"},{"group":"","resource":"namespaces","name":"openshift-dns"}],"extension":null}}config/clusteroperator/csi-snapshot-controller.json0000640000000000000000000000321715156522210021433 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"csi-snapshot-controller","uid":"14aebfa6-62ea-451e-81fd-7277fd3442cc","resourceVersion":"9932","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"CSISnapshot","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:09:03Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:09:03Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"csi-snapshot-controller","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cluster-storage-operator"},{"group":"operator.openshift.io","resource":"csisnapshotcontrollers","name":"cluster"}],"extension":null}}config/clusteroperator/control-plane-machine-set.json0000640000000000000000000000263515156522210021612 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"control-plane-machine-set","uid":"427d666b-51bc-40b0-8752-c005021fbd64","resourceVersion":"8490","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:10:35Z","reason":"AsExpected","message":"cluster operator is available"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:10:35Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:10:35Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:10:35Z","reason":"AsExpected","message":"cluster operator is upgradable"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"machine.openshift.io","resource":"controlplanemachinesets","name":""},{"group":"machine.openshift.io","resource":"machines","name":""}],"extension":null}}config/clusteroperator/console.json0000640000000000000000000000131215156522210016273 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"console","uid":"c889b826-134b-40b6-9f36-bb8895432642","resourceVersion":"792","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"Console","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"extension":null}}config/clusteroperator/config-operator.json0000640000000000000000000000311615156522210017733 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"config-operator","uid":"e1327393-0b59-4bd9-b60e-68efdbb0421d","resourceVersion":"8440","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"AsExpected","message":"All is well"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"NoData"}],"versions":[{"name":"feature-gates","version":"4.18.35"},{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"configs","name":"cluster"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-operator"}],"extension":null}}config/clusteroperator/cluster-autoscaler.json0000640000000000000000000000266015156522210020461 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster-autoscaler","uid":"8eda13dd-9b44-4457-b65a-d1881b55fbc8","resourceVersion":"10541","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:10:59Z","reason":"AsExpected","message":"at version 4.18.35"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:35Z"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:35Z"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:10:59Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"autoscaling.openshift.io","resource":"machineautoscalers","namespace":"openshift-machine-api","name":""},{"group":"autoscaling.openshift.io","resource":"clusterautoscalers","namespace":"openshift-machine-api","name":""},{"group":"","resource":"namespaces","name":"openshift-machine-api"}],"extension":null}}config/clusteroperator/cloud-credential.json0000640000000000000000000002022415156522210020052 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-credential","uid":"d0111655-abba-46f5-baf7-9100d8033179","resourceVersion":"10474","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"CloudCredential","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:08Z","reason":"AsExpected","message":"All is well"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:08Z","reason":"AsExpected","message":"All is well"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:08Z","reason":"AsExpected","message":"All is well"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:08Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"aws-ebs-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-disk-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"azure-file-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-gcp-ro-creds"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"cloud-credential-operator-iam-ro"},{"group":"operator.openshift.io","resource":"cloudcredentials","name":"cluster"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-powervs-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ibm-vpc-block-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"manila-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-azure-cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-credential-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cloud-network-config-controller-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-cluster-csi-drivers"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-ccm"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-gcp-pd-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ibm-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-gcs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-ibmcos-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-image-registry-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-ingress-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-aws"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-azure"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-gcp"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-ibmcloud"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-nutanix"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-openstack"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-powervs"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-machine-api-vsphere"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-network"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-nutanix-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-openstack-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-powervs-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vmware-vsphere-csi-driver-operator"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-cloud-controller-manager"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"openshift-vsphere-problem-detector"},{"group":"cloudcredential.openshift.io","resource":"credentialsrequests","namespace":"openshift-cloud-credential-operator","name":"ovirt-csi-driver-operator"}],"extension":null}}config/clusteroperator/cloud-controller-manager.json0000640000000000000000000000440115156522210021532 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"cloud-controller-manager","uid":"a0664535-31e8-4d96-91ed-b67055f79daa","resourceVersion":"9866","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"CloudControllerManager","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"TrustedCABundleControllerControllerAvailable","status":"True","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"TrustedCABundleControllerControllerDegraded","status":"False","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected","message":"Trusted CA Bundle Controller works as expected"},{"type":"CloudConfigControllerAvailable","status":"True","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"CloudConfigControllerDegraded","status":"False","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected","message":"Cloud Config Controller works as expected"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected","message":"Cluster Cloud Controller Manager Operator is available at 4.18.35"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:11:02Z","reason":"AsExpected"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager-operator"},{"group":"config.openshift.io","resource":"clusteroperators","name":"cloud-controller-manager"},{"group":"","resource":"namespaces","name":"openshift-cloud-controller-manager"}],"extension":null}}config/clusteroperator/baremetal.json0000640000000000000000000000427015156522210016573 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"baremetal","uid":"88c98927-6d67-4d47-aa15-21032ba04fdc","resourceVersion":"6393","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"capability.openshift.io/name":"baremetal","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:08:46Z","reason":"WaitingForProvisioningCR"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:46Z"},{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:08:46Z","reason":"WaitingForProvisioningCR","message":"Waiting for Provisioning CR on BareMetal Platform"},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:46Z"},{"type":"Disabled","status":"False","lastTransitionTime":"2026-03-18T13:08:46Z"}],"versions":[{"name":"operator","version":"4.18.35"}],"relatedObjects":[{"group":"","resource":"namespaces","name":"openshift-machine-api"},{"group":"metal3.io","resource":"baremetalhosts","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"provisioning","name":""},{"group":"metal3.io","resource":"hostfirmwaresettings","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"firmwareschemas","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"preprovisioningimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"bmceventsubscriptions","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostfirmwarecomponents","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"dataimages","namespace":"openshift-machine-api","name":""},{"group":"metal3.io","resource":"hostupdatepolicies","namespace":"openshift-machine-api","name":""}],"extension":null}}config/clusteroperator/authentication.json0000640000000000000000000000773215156522210017664 0ustar0000000000000000{"kind":"ClusterOperator","apiVersion":"config.openshift.io/v1","metadata":{"name":"authentication","uid":"4c3883fc-81fc-4952-b089-6349721d1cfa","resourceVersion":"6916","generation":1,"creationTimestamp":"2026-03-18T13:01:58Z","annotations":{"exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{},"status":{"conditions":[{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:09Z","reason":"AsExpected","message":"WebhookAuthenticatorControllerDegraded: failed to read service-ca crt bundle: open /var/run/configmaps/service-ca-bundle/service-ca.crt: no such file or directory\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://172.30.71.102:443/healthz\": dial tcp 172.30.71.102:443: connect: connection refused\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"},{"type":"Progressing","status":"False","lastTransitionTime":"2026-03-18T13:08:50Z","reason":"AsExpected","message":"AuthenticatorCertKeyProgressing: All is well"},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:08:09Z","reason":"APIServices_Error::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointsEndpointAccessibleController_ResourceNotFound::ReadyIngressNodes_NoReadyIngressNodes","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.128.0.33:8443/apis/oauth.openshift.io/v1: bad status from https://10.128.0.33:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.128.0.33:8443/apis/user.openshift.io/v1: bad status from https://10.128.0.33:8443/apis/user.openshift.io/v1: 401\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://172.30.71.102:443/healthz\": dial tcp 172.30.71.102:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerAvailable: endpoints \"oauth-openshift\" not found\nReadyIngressNodesAvailable: Authentication requires functional ingress which requires at least one schedulable and ready node. Got 0 worker nodes, 1 master nodes, 0 custom target nodes (none are schedulable or ready for ingress pods)."},{"type":"Upgradeable","status":"True","lastTransitionTime":"2026-03-18T13:08:09Z","reason":"AsExpected","message":"All is well"},{"type":"EvaluationConditionsDetected","status":"Unknown","lastTransitionTime":"2026-03-18T13:08:06Z","reason":"NoData"}],"versions":[{"name":"operator","version":"4.18.35"},{"name":"oauth-apiserver","version":"4.18.35"}],"relatedObjects":[{"group":"operator.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"authentications","name":"cluster"},{"group":"config.openshift.io","resource":"infrastructures","name":"cluster"},{"group":"config.openshift.io","resource":"oauths","name":"cluster"},{"group":"route.openshift.io","resource":"routes","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"services","namespace":"openshift-authentication","name":"oauth-openshift"},{"group":"","resource":"namespaces","name":"openshift-config"},{"group":"","resource":"namespaces","name":"openshift-config-managed"},{"group":"","resource":"namespaces","name":"openshift-authentication"},{"group":"","resource":"namespaces","name":"openshift-authentication-operator"},{"group":"","resource":"namespaces","name":"openshift-ingress"},{"group":"","resource":"namespaces","name":"openshift-oauth-apiserver"}],"extension":null}}config/validatingwebhookconfigurations/performance-addon-operator.json0000640000000000000000000000552115156522210025273 0ustar0000000000000000{"metadata":{"name":"performance-addon-operator","uid":"1b88295c-a716-4192-acec-fcf85c0479fe","resourceVersion":"4505","generation":2,"creationTimestamp":"2026-03-18T13:02:25Z","annotations":{"capability.openshift.io/name":"NodeTuning","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"webhooks":[{"name":"vwb.performance.openshift.io","clientConfig":{"service":{"namespace":"openshift-cluster-node-tuning-operator","name":"performance-addon-operator-service","path":"/validate-performance-openshift-io-v2-performanceprofile","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["performance.openshift.io"],"apiVersions":["v2"],"resources":["performanceprofiles"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/network-node-identity.openshift.io.json0000640000000000000000000001075515156522210026732 0ustar0000000000000000{"metadata":{"name":"network-node-identity.openshift.io","uid":"08d2ff29-494b-414d-86ad-8b5b22f383c4","resourceVersion":"7123","generation":1,"creationTimestamp":"2026-03-18T13:09:00Z","ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"node.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/node","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["nodes/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"pod.network-node-identity.openshift.io","clientConfig":{"url":"https://127.0.0.1:9743/pod","caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHg="},"rules":[{"operations":["UPDATE"],"apiGroups":["*"],"apiVersions":["*"],"resources":["pods/status"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/multus.openshift.io.json0000640000000000000000000000506715156522210024020 0ustar0000000000000000{"metadata":{"name":"multus.openshift.io","uid":"5d6232d2-444a-44ac-90c1-41fcdc6b260d","resourceVersion":"4501","generation":2,"creationTimestamp":"2026-03-18T13:06:45Z","labels":{"app":"multus-admission-controller"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"operator.openshift.io/v1","kind":"Network","name":"cluster","uid":"2ca22bb3-6026-4fcd-ab80-45e7a7698067","controller":true,"blockOwnerDeletion":true}]},"webhooks":[{"name":"multus-validating-config.k8s.io","clientConfig":{"service":{"namespace":"openshift-multus","name":"multus-admission-controller","path":"/validate","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["k8s.cni.cncf.io"],"apiVersions":["v1"],"resources":["network-attachment-definitions"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"NoneOnDryRun","timeoutSeconds":30,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/controlplanemachineset.machine.openshift.io.json0000640000000000000000000000537315156522210030633 0ustar0000000000000000{"metadata":{"name":"controlplanemachineset.machine.openshift.io","uid":"a2ed0423-d2e2-4813-a215-32288a9b11f1","resourceVersion":"10135","generation":2,"creationTimestamp":"2026-03-18T13:11:23Z","annotations":{"capability.openshift.io/name":"MachineAPI","exclude.release.openshift.io/internal-openshift-hosted":"true","include.release.openshift.io/self-managed-high-availability":"true","service.beta.openshift.io/inject-cabundle":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"webhooks":[{"name":"controlplanemachineset.machine.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"control-plane-machine-set-operator","path":"/validate-machine-openshift-io-v1-controlplanemachineset","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["machine.openshift.io"],"apiVersions":["v1"],"resources":["controlplanemachinesets"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/validatingwebhookconfigurations/cluster-baremetal-validating-webhook-configuration.json0000640000000000000000000000500115156522210032103 0ustar0000000000000000{"metadata":{"name":"cluster-baremetal-validating-webhook-configuration","uid":"91058a05-f1b9-4f69-acaf-4fc8343f505f","resourceVersion":"6400","generation":2,"creationTimestamp":"2026-03-18T13:08:46Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true","include.release.openshift.io/single-node-developer":"true","service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"vprovisioning.kb.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-baremetal-webhook-service","path":"/validate-metal3-io-v1alpha1-provisioning","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["metal3.io"],"apiVersions":["v1alpha1"],"resources":["provisionings"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1","v1beta1"]}]}config/validatingwebhookconfigurations/autoscaling.openshift.io.json0000640000000000000000000001102615156522210024770 0ustar0000000000000000{"metadata":{"name":"autoscaling.openshift.io","uid":"4cbf3810-e6b3-48bd-9333-0b807f0e661a","resourceVersion":"9778","generation":2,"creationTimestamp":"2026-03-18T13:10:59Z","labels":{"k8s-app":"cluster-autoscaler-operator"},"annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"clusterautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-clusterautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1"],"resources":["clusterautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]},{"name":"machineautoscalers.autoscaling.openshift.io","clientConfig":{"service":{"namespace":"openshift-machine-api","name":"cluster-autoscaler-operator","path":"/validate-machineautoscalers","port":443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["autoscaling.openshift.io"],"apiVersions":["v1beta1"],"resources":["machineautoscalers"],"scope":"*"}],"failurePolicy":"Ignore","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"]}]}config/namespaces_with_overlapping_uids.json0000640000000000000000000000000215156522210020173 0ustar0000000000000000[]config/pod/openshift-cluster-version/cluster-version-operator-7d58488df-2bmkn.json0000640000000000000000000001341415156522210026574 0ustar0000000000000000{"metadata":{"name":"cluster-version-operator-7d58488df-2bmkn","generateName":"cluster-version-operator-7d58488df-","namespace":"openshift-cluster-version","uid":"e4d0b174-33e4-46ee-863b-b5cc2a271b85","resourceVersion":"7389","creationTimestamp":"2026-03-18T13:08:53Z","labels":{"k8s-app":"cluster-version-operator","pod-template-hash":"7d58488df"},"annotations":{"openshift.io/required-scc":"hostaccess","openshift.io/scc":"hostaccess"},"ownerReferences":[{"apiVersion":"apps/v1","kind":"ReplicaSet","name":"cluster-version-operator-7d58488df","uid":"e9dd2e6c-53d1-4df8-8d73-61ccfb80cc22","controller":true,"blockOwnerDeletion":true}]},"spec":{"volumes":[{"name":"etc-ssl-certs","hostPath":{"path":"/etc/ssl/certs","type":""}},{"name":"etc-cvo-updatepayloads","hostPath":{"path":"/etc/cvo/updatepayloads","type":""}},{"name":"serving-cert","secret":{"secretName":"cluster-version-operator-serving-cert","defaultMode":420}},{"name":"service-ca","configMap":{"name":"openshift-service-ca.crt","defaultMode":420}},{"name":"kube-api-access","projected":{"sources":[{"serviceAccountToken":{"expirationSeconds":3600,"path":"token"}},{"configMap":{"name":"kube-root-ca.crt","items":[{"key":"ca.crt","path":"ca.crt"}]}},{"downwardAPI":{"items":[{"path":"namespace","fieldRef":{"apiVersion":"v1","fieldPath":"metadata.namespace"}}]}}],"defaultMode":420}}],"containers":[{"name":"cluster-version-operator","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","args":["start","--release-image=quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","--enable-auto-update=false","--listen=0.0.0.0:9099","--serving-cert-file=/etc/tls/serving-cert/tls.crt","--serving-key-file=/etc/tls/serving-cert/tls.key","--v=2","--always-enable-capabilities=Ingress"],"env":[{"name":"OPERATOR_IMAGE_VERSION","value":"0.0.1-snapshot"},{"name":"KUBERNETES_SERVICE_PORT","value":"6443"},{"name":"KUBERNETES_SERVICE_HOST","value":"api-int.sno.openstack.lab"},{"name":"NODE_NAME","valueFrom":{"fieldRef":{"apiVersion":"v1","fieldPath":"spec.nodeName"}}},{"name":"CLUSTER_PROFILE","value":"self-managed-high-availability"}],"resources":{"requests":{"cpu":"20m","memory":"50Mi"}},"volumeMounts":[{"name":"etc-ssl-certs","readOnly":true,"mountPath":"/etc/ssl/certs"},{"name":"etc-cvo-updatepayloads","readOnly":true,"mountPath":"/etc/cvo/updatepayloads"},{"name":"serving-cert","readOnly":true,"mountPath":"/etc/tls/serving-cert"},{"name":"service-ca","readOnly":true,"mountPath":"/etc/tls/service-ca"},{"name":"kube-api-access","readOnly":true,"mountPath":"/var/run/secrets/kubernetes.io/serviceaccount"}],"terminationMessagePath":"/dev/termination-log","terminationMessagePolicy":"FallbackToLogsOnError","imagePullPolicy":"IfNotPresent","securityContext":{"capabilities":{"drop":["KILL","MKNOD","SETGID","SETUID"]},"runAsUser":1000040000,"runAsNonRoot":true}}],"restartPolicy":"Always","terminationGracePeriodSeconds":130,"dnsPolicy":"Default","nodeSelector":{"node-role.kubernetes.io/master":""},"serviceAccountName":"default","serviceAccount":"default","automountServiceAccountToken":false,"nodeName":"master-0","hostNetwork":true,"securityContext":{"seLinuxOptions":{"level":"s0:c6,c5"},"fsGroup":1000040000},"schedulerName":"default-scheduler","tolerations":[{"key":"node-role.kubernetes.io/master","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/network-unavailable","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoSchedule"},{"key":"node.kubernetes.io/unreachable","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/not-ready","operator":"Exists","effect":"NoExecute","tolerationSeconds":120},{"key":"node.kubernetes.io/memory-pressure","operator":"Exists","effect":"NoSchedule"}],"priorityClassName":"system-cluster-critical","priority":2000000000,"enableServiceLinks":true,"preemptionPolicy":"PreemptLowerPriority"},"status":{"phase":"Running","conditions":[{"type":"PodReadyToStartContainers","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"Initialized","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:53Z"},{"type":"Ready","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"ContainersReady","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:09:03Z"},{"type":"PodScheduled","status":"True","lastProbeTime":null,"lastTransitionTime":"2026-03-18T13:08:53Z"}],"hostIP":"192.168.32.10","hostIPs":[{"ip":"192.168.32.10"}],"podIP":"192.168.32.10","podIPs":[{"ip":"192.168.32.10"}],"startTime":"2026-03-18T13:08:53Z","containerStatuses":[{"name":"cluster-version-operator","state":{"running":{"startedAt":"2026-03-18T13:09:02Z"}},"lastState":{},"ready":true,"restartCount":0,"image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","imageID":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","containerID":"cri-o://1b8157f4c23747a17d99cd1a75b5fd67d7d1923b9d3c78ebf701ed19d3b1c48e","started":true,"volumeMounts":[{"name":"etc-ssl-certs","mountPath":"/etc/ssl/certs","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"etc-cvo-updatepayloads","mountPath":"/etc/cvo/updatepayloads","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"serving-cert","mountPath":"/etc/tls/serving-cert","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"service-ca","mountPath":"/etc/tls/service-ca","readOnly":true,"recursiveReadOnly":"Disabled"},{"name":"kube-api-access","mountPath":"/var/run/secrets/kubernetes.io/serviceaccount","readOnly":true,"recursiveReadOnly":"Disabled"}]}],"qosClass":"Burstable"}}config/id0000640000000000000000000000004415156522210011021 0ustar00000000000000007902eeee-37c4-4129-a8da-e86d40e8d641config/version.json0000640000000000000000000000725015156522210013070 0ustar0000000000000000{"metadata":{"name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","resourceVersion":"10132","generation":2,"creationTimestamp":"2026-03-18T13:01:33Z"},"spec":{"clusterID":"7902eeee-37c4-4129-a8da-e86d40e8d641","channel":"stable-4.18","signatureStores":null},"status":{"desired":{"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","url":"https://access.redhat.com/errata/RHSA-2026:3905","channels":["candidate-4.18","candidate-4.19","candidate-4.20","eus-4.18","fast-4.18","stable-4.18"]},"history":[{"state":"Partial","startedTime":"2026-03-18T13:01:58Z","completionTime":null,"version":"4.18.35","image":"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1","verified":false}],"observedGeneration":2,"versionHash":"Uw6h6T7stl0=","capabilities":{"enabledCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"],"knownCapabilities":["Build","CSISnapshot","CloudControllerManager","CloudCredential","Console","DeploymentConfig","ImageRegistry","Ingress","Insights","MachineAPI","NodeTuning","OperatorLifecycleManager","OperatorLifecycleManagerV1","Storage","baremetal","marketplace","openshift-samples"]},"conditions":[{"type":"RetrievedUpdates","status":"True","lastTransitionTime":"2026-03-18T13:01:58Z"},{"type":"Upgradeable","status":"False","lastTransitionTime":"2026-03-18T13:01:58Z","reason":"AdminAckRequired","message":"Kubernetes 1.32 and therefore OpenShift 4.19 remove several APIs which require admin consideration. Please see the knowledge article https://access.redhat.com/articles/7112216 for details and instructions."},{"type":"ImplicitlyEnabledCapabilities","status":"False","lastTransitionTime":"2026-03-18T13:01:58Z","reason":"AsExpected","message":"Capabilities match configured spec"},{"type":"ReleaseAccepted","status":"True","lastTransitionTime":"2026-03-18T13:01:58Z","reason":"PayloadLoaded","message":"Payload loaded version=\"4.18.35\" image=\"quay.io/openshift-release-dev/ocp-release@sha256:59727c4b3fef19e5149675cf3350735bbfe2c6588a57654b2e4552dd719f58b1\" architecture=\"amd64\""},{"type":"Available","status":"False","lastTransitionTime":"2026-03-18T13:01:58Z"},{"type":"Failing","status":"True","lastTransitionTime":"2026-03-18T13:11:22Z","reason":"MultipleErrors","message":"Multiple errors are preventing progress:\n* Cluster operators authentication, cloud-controller-manager, cloud-credential, cluster-autoscaler, control-plane-machine-set, dns, etcd, image-registry, insights, kube-apiserver, kube-controller-manager, kube-scheduler, machine-api, machine-approver, machine-config, monitoring, openshift-apiserver, openshift-controller-manager, openshift-samples, operator-lifecycle-manager-packageserver, storage are not available\n* Could not update imagestream \"openshift/driver-toolkit\" (617 of 908): resource may have been deleted\n* Could not update oauthclient \"console\" (550 of 908): the server does not recognize this resource, check extension API servers\n* Could not update role \"openshift-console-operator/prometheus-k8s\" (825 of 908): the server is reporting an internal error\n* Could not update role \"openshift-console/prometheus-k8s\" (829 of 908): resource may have been deleted"},{"type":"Progressing","status":"True","lastTransitionTime":"2026-03-18T13:01:58Z","reason":"MultipleErrors","message":"Unable to apply 4.18.35: an unknown error has occurred: MultipleErrors"}],"availableUpdates":null}}config/mutatingwebhookconfigurations/catalogd-mutating-webhook-configuration.json0000640000000000000000000000533615156522210027475 0ustar0000000000000000{"metadata":{"name":"catalogd-mutating-webhook-configuration","uid":"7f7736b0-5143-43b1-ba72-03ab14f51293","resourceVersion":"5815","generation":2,"creationTimestamp":"2026-03-18T13:08:38Z","annotations":{"service.beta.openshift.io/inject-cabundle":"true"}},"webhooks":[{"name":"inject-metadata-name.olm.operatorframework.io","clientConfig":{"service":{"namespace":"openshift-catalogd","name":"catalogd-service","path":"/mutate-olm-operatorframework-io-v1-clustercatalog","port":9443},"caBundle":"eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4eHh4"},"rules":[{"operations":["CREATE","UPDATE"],"apiGroups":["olm.operatorframework.io"],"apiVersions":["v1"],"resources":["clustercatalogs"],"scope":"*"}],"failurePolicy":"Fail","matchPolicy":"Equivalent","namespaceSelector":{},"objectSelector":{},"sideEffects":"None","timeoutSeconds":10,"admissionReviewVersions":["v1"],"reinvocationPolicy":"Never","matchConditions":[{"name":"MissingOrIncorrectMetadataNameLabel","expression":"'name' in object.metadata \u0026\u0026 (!has(object.metadata.labels) || !('olm.operatorframework.io/metadata.name' in object.metadata.labels) || object.metadata.labels['olm.operatorframework.io/metadata.name'] != object.metadata.name)"}]}]}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/edit.json0000640000000000000000000002215615156522210025477 0ustar0000000000000000{"metadata":{"name":"edit","uid":"e7670fbc-15e5-49aa-a91b-b4e633b78a41","resourceVersion":"7975","creationTimestamp":"2026-03-18T13:00:34Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults","rbac.authorization.k8s.io/aggregate-to-admin":"true"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-edit":"true"}}]}}cluster-scoped-resources/rbac.authorization.k8s.io/clusterroles/admin.json0000640000000000000000000002504315156522210025640 0ustar0000000000000000{"metadata":{"name":"admin","uid":"5fb00ff4-be0a-4dbc-a719-9c3792a6dc8c","resourceVersion":"7987","creationTimestamp":"2026-03-18T13:00:34Z","labels":{"kubernetes.io/bootstrapping":"rbac-defaults"},"annotations":{"rbac.authorization.kubernetes.io/autoupdate":"true"}},"rules":[{"verbs":["create","update","patch","delete"],"apiGroups":["operators.coreos.com"],"resources":["subscriptions"]},{"verbs":["delete"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions"]},{"verbs":["get","list","watch"],"apiGroups":["operators.coreos.com"],"resources":["clusterserviceversions","catalogsources","installplans","subscriptions","operatorgroups"]},{"verbs":["get","list","watch"],"apiGroups":["packages.operators.coreos.com"],"resources":["packagemanifests","packagemanifests/icon"]},{"verbs":["create","update","patch","delete"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":[""],"resources":["secrets","serviceaccounts"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreams/secrets","imagestreamtags","imagetags"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimports"]},{"verbs":["get","update"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["pods/attach","pods/exec","pods/portforward","pods/proxy","secrets","services/proxy"]},{"verbs":["impersonate"],"apiGroups":[""],"resources":["serviceaccounts"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["pods","pods/attach","pods/exec","pods/portforward","pods/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["pods/eviction"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":[""],"resources":["configmaps","endpoints","events","persistentvolumeclaims","replicationcontrollers","replicationcontrollers/scale","secrets","serviceaccounts","services","services/proxy"]},{"verbs":["create"],"apiGroups":[""],"resources":["serviceaccounts/token"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["apps"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","replicasets","replicasets/scale","statefulsets","statefulsets/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["batch"],"resources":["cronjobs","jobs"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["extensions"],"resources":["daemonsets","deployments","deployments/rollback","deployments/scale","ingresses","networkpolicies","replicasets","replicasets/scale","replicationcontrollers/scale"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["policy"],"resources":["poddisruptionbudgets"]},{"verbs":["create","delete","deletecollection","patch","update"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["coordination.k8s.io"],"resources":["leases"]},{"verbs":["create"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams"]},{"verbs":["update"],"apiGroups":["","build.openshift.io"],"resources":["builds/details"]},{"verbs":["get"],"apiGroups":["","build.openshift.io"],"resources":["builds"]},{"verbs":["get","list","watch","create","update","patch","delete","deletecollection"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["builds/log"]},{"verbs":["create"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs/instantiate","buildconfigs/instantiatebinary","builds/clone"]},{"verbs":["edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["create"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigrollbacks","deploymentconfigs/instantiate","deploymentconfigs/rollback"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs/log","deploymentconfigs/status"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/status"]},{"verbs":["get","list","watch"],"apiGroups":["","quota.openshift.io"],"resources":["appliedclusterresourcequotas"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["create"],"apiGroups":["","route.openshift.io"],"resources":["routes/custom-host"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["networking.k8s.io"],"resources":["networkpolicies"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["resourcequotausages"]},{"verbs":["get","list","watch"],"apiGroups":["k8s.ovn.org"],"resources":["userdefinednetworks"]},{"verbs":["get","list","watch"],"apiGroups":["","image.openshift.io"],"resources":["imagestreamimages","imagestreammappings","imagestreams","imagestreamtags","imagetags"]},{"verbs":["get"],"apiGroups":["","image.openshift.io"],"resources":["imagestreams/layers"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["configmaps","endpoints","persistentvolumeclaims","persistentvolumeclaims/status","pods","replicationcontrollers","replicationcontrollers/scale","serviceaccounts","services","services/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["bindings","events","limitranges","namespaces/status","pods/log","pods/status","replicationcontrollers/status","resourcequotas","resourcequotas/status"]},{"verbs":["get","list","watch"],"apiGroups":[""],"resources":["namespaces"]},{"verbs":["get","list","watch"],"apiGroups":["discovery.k8s.io"],"resources":["endpointslices"]},{"verbs":["get","list","watch"],"apiGroups":["apps"],"resources":["controllerrevisions","daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","replicasets","replicasets/scale","replicasets/status","statefulsets","statefulsets/scale","statefulsets/status"]},{"verbs":["get","list","watch"],"apiGroups":["autoscaling"],"resources":["horizontalpodautoscalers","horizontalpodautoscalers/status"]},{"verbs":["get","list","watch"],"apiGroups":["batch"],"resources":["cronjobs","cronjobs/status","jobs","jobs/status"]},{"verbs":["get","list","watch"],"apiGroups":["extensions"],"resources":["daemonsets","daemonsets/status","deployments","deployments/scale","deployments/status","ingresses","ingresses/status","networkpolicies","replicasets","replicasets/scale","replicasets/status","replicationcontrollers/scale"]},{"verbs":["get","list","watch"],"apiGroups":["policy"],"resources":["poddisruptionbudgets","poddisruptionbudgets/status"]},{"verbs":["get","list","watch"],"apiGroups":["networking.k8s.io"],"resources":["ingresses","ingresses/status","networkpolicies"]},{"verbs":["get","list","watch"],"apiGroups":["snapshot.storage.k8s.io"],"resources":["volumesnapshots"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildconfigs","buildconfigs/webhooks","builds"]},{"verbs":["view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["get","list","watch"],"apiGroups":["","apps.openshift.io"],"resources":["deploymentconfigs","deploymentconfigs/scale"]},{"verbs":["get","list","watch"],"apiGroups":["","route.openshift.io"],"resources":["routes"]},{"verbs":["get","list","watch"],"apiGroups":["","template.openshift.io"],"resources":["processedtemplates","templateconfigs","templateinstances","templates"]},{"verbs":["get","list","watch"],"apiGroups":["","build.openshift.io"],"resources":["buildlogs"]},{"verbs":["watch","list","get"],"apiGroups":["k8s.cni.cncf.io"],"resources":["network-attachment-definitions"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindings","roles"]},{"verbs":["create","delete","deletecollection","get","list","patch","update","watch"],"apiGroups":["rbac.authorization.k8s.io"],"resources":["rolebindings","roles"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["localresourceaccessreviews","localsubjectaccessreviews","subjectrulesreviews"]},{"verbs":["create"],"apiGroups":["authorization.k8s.io"],"resources":["localsubjectaccessreviews"]},{"verbs":["delete","get"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["create"],"apiGroups":["","authorization.openshift.io"],"resources":["resourceaccessreviews","subjectaccessreviews"]},{"verbs":["create"],"apiGroups":["","security.openshift.io"],"resources":["podsecuritypolicyreviews","podsecuritypolicyselfsubjectreviews","podsecuritypolicysubjectreviews"]},{"verbs":["get","list","watch"],"apiGroups":["","authorization.openshift.io"],"resources":["rolebindingrestrictions"]},{"verbs":["admin","edit","view"],"apiGroups":["build.openshift.io"],"resources":["jenkins"]},{"verbs":["delete","get","patch","update"],"apiGroups":["","project.openshift.io"],"resources":["projects"]},{"verbs":["update"],"apiGroups":["","route.openshift.io"],"resources":["routes/status"]}],"aggregationRule":{"clusterRoleSelectors":[{"matchLabels":{"rbac.authorization.k8s.io/aggregate-to-admin":"true"}}]}}config/machineconfigpools/worker.json0000640000000000000000000000106615156522210016562 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-18T13:11:26Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","pools.operator.machineconfiguration.openshift.io/worker":""},"name":"worker","resourceVersion":"10356","uid":"5e38beb6-19aa-4022-a8c4-c2cc38349dd6"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"worker"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/worker":""}},"paused":false}}config/machineconfigpools/master.json0000640000000000000000000000117315156522210016543 0ustar0000000000000000{"apiVersion":"machineconfiguration.openshift.io/v1","kind":"MachineConfigPool","metadata":{"creationTimestamp":"2026-03-18T13:11:26Z","generation":1,"labels":{"machineconfiguration.openshift.io/mco-built-in":"","operator.machineconfiguration.openshift.io/required-for-upgrade":"","pools.operator.machineconfiguration.openshift.io/master":""},"name":"master","resourceVersion":"10354","uid":"4dfc7a83-f8a1-41ad-bb5b-181061859fff"},"spec":{"configuration":{},"machineConfigSelector":{"matchLabels":{"machineconfiguration.openshift.io/role":"master"}},"nodeSelector":{"matchLabels":{"node-role.kubernetes.io/master":""}},"paused":false}}config/schedulers/cluster.json0000640000000000000000000000052415156522210015222 0ustar0000000000000000{"kind":"Scheduler","apiVersion":"config.openshift.io/v1","metadata":{"name":"cluster","uid":"21eb915c-6b6e-4b17-95ff-15157d918287","resourceVersion":"564","generation":1,"creationTimestamp":"2026-03-18T13:01:31Z"},"spec":{"policy":{"name":""},"profileCustomizations":{"dynamicResourceAllocation":""},"mastersSchedulable":true},"status":{}}config/crd/volumesnapshotcontents.snapshot.storage.k8s.io.json0000640000000000000000000005444315156522210023441 0ustar0000000000000000{"metadata":{"name":"volumesnapshotcontents.snapshot.storage.k8s.io","uid":"faf19980-ad08-4b51-9c0d-abfb36657620","resourceVersion":"6093","generation":1,"creationTimestamp":"2026-03-18T13:08:39Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/955","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"scope":"Cluster","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the\nunderlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system.\nRequired.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on\nthe underlying storage system should be deleted when its bound VolumeSnapshot is deleted.\nSupported values are \"Retain\" and \"Delete\".\n\"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept.\n\"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted.\nFor dynamically provisioned snapshots, this field will automatically be filled in by the\nCSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding\nVolumeSnapshotClass.\nFor pre-existing snapshots, users MUST specify this field when creating the\n VolumeSnapshotContent object.\nRequired.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on\nthe underlying storage system.\nThis MUST be the same as the name returned by the CSI GetPluginName() call for\nthat driver.\nRequired.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned\nor already exists, and just requires a Kubernetes object representation.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on\nthe underlying storage system for which a Kubernetes object representation\nwas (or should be) created.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"snapshotHandle is immutable"}]},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot\nshould be dynamically taken from.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeHandle is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.volumeHandle) || has(self.volumeHandle)","message":"volumeHandle is required once set"},{"rule":"!has(oldSelf.snapshotHandle) || has(self.snapshotHandle)","message":"snapshotHandle is required once set"},{"rule":"(has(self.volumeHandle) \u0026\u0026 !has(self.snapshotHandle)) || (!has(self.volumeHandle) \u0026\u0026 has(self.snapshotHandle))","message":"exactly one of volumeHandle and snapshotHandle must be set"}]},"sourceVolumeMode":{"description":"SourceVolumeMode is the mode of the volume whose snapshot is taken.\nCan be either “Filesystem” or “Block”.\nIf not specified, it indicates the source volume's mode is unknown.\nThis field is immutable.\nThis field is an alpha field.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"sourceVolumeMode is immutable"}]},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be)\ncreated.\nNote that after provisioning, the VolumeSnapshotClass may be deleted or\nrecreated with different set of values, and as such, should not be referenced\npost-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this\nVolumeSnapshotContent object is bound.\nVolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to\nthis VolumeSnapshotContent's name for the bidirectional binding to be valid.\nFor a pre-existing VolumeSnapshotContent object, name and namespace of the\nVolumeSnapshot object MUST be provided for binding to happen.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string\nshould contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2].\nFor example, if the object reference is to a container within a pod, this would take on a value like:\n\"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered\nthe event) or if no container name is specified \"spec.containers[2]\" (container with\nindex 2 in this pod). This syntax is chosen only to have some well-defined way of\nreferencing a part of an object.\nTODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent.\nMore info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}},"x-kubernetes-map-type":"atomic","x-kubernetes-validations":[{"rule":"has(self.name) \u0026\u0026 has(self.__namespace__)","message":"both spec.volumeSnapshotRef.name and spec.volumeSnapshotRef.namespace must be set"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.sourceVolumeMode) || has(self.sourceVolumeMode)","message":"sourceVolumeMode is required once set"}]},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it indicates the creation time is unknown.\nThe format of this field is a Unix nanoseconds time encoded as an int64.\nOn Unix, the command `date +%s%N` returns the current time in nanoseconds\nsince 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nUpon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes.\nIn dynamic snapshot creation case, this field will be filled in by the\nCSI snapshotter sidecar with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system.\nIf not specified, it indicates that dynamic snapshot creation has either failed\nor it is still in progress.","type":"string"},"volumeGroupSnapshotHandle":{"description":"VolumeGroupSnapshotHandle is the CSI \"group_snapshot_id\" of a group snapshot\non the underlying storage system.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshotContent is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshotContent","schema":{"openAPIV3Schema":{"description":"VolumeSnapshotContent represents the actual \"on-disk\" snapshot object in the underlying storage system","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines properties of a VolumeSnapshotContent created by the underlying storage system. Required.","type":"object","required":["deletionPolicy","driver","source","volumeSnapshotRef"],"properties":{"deletionPolicy":{"description":"deletionPolicy determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted. Supported values are \"Retain\" and \"Delete\". \"Retain\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are kept. \"Delete\" means that the VolumeSnapshotContent and its physical snapshot on underlying storage system are deleted. For dynamically provisioned snapshots, this field will automatically be filled in by the CSI snapshotter sidecar with the \"DeletionPolicy\" field defined in the corresponding VolumeSnapshotClass. For pre-existing snapshots, users MUST specify this field when creating the VolumeSnapshotContent object. Required.","type":"string","enum":["Delete","Retain"]},"driver":{"description":"driver is the name of the CSI driver used to create the physical snapshot on the underlying storage system. This MUST be the same as the name returned by the CSI GetPluginName() call for that driver. Required.","type":"string"},"source":{"description":"source specifies whether the snapshot is (or should be) dynamically provisioned or already exists, and just requires a Kubernetes object representation. This field is immutable after creation. Required.","type":"object","properties":{"snapshotHandle":{"description":"snapshotHandle specifies the CSI \"snapshot_id\" of a pre-existing snapshot on the underlying storage system for which a Kubernetes object representation was (or should be) created. This field is immutable.","type":"string"},"volumeHandle":{"description":"volumeHandle specifies the CSI \"volume_id\" of the volume from which a snapshot should be dynamically taken from. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"name of the VolumeSnapshotClass from which this snapshot was (or will be) created. Note that after provisioning, the VolumeSnapshotClass may be deleted or recreated with different set of values, and as such, should not be referenced post-snapshot creation.","type":"string"},"volumeSnapshotRef":{"description":"volumeSnapshotRef specifies the VolumeSnapshot object to which this VolumeSnapshotContent object is bound. VolumeSnapshot.Spec.VolumeSnapshotContentName field must reference to this VolumeSnapshotContent's name for the bidirectional binding to be valid. For a pre-existing VolumeSnapshotContent object, name and namespace of the VolumeSnapshot object MUST be provided for binding to happen. This field is immutable after creation. Required.","type":"object","properties":{"apiVersion":{"description":"API version of the referent.","type":"string"},"fieldPath":{"description":"If referring to a piece of an object instead of an entire object, this string should contain a valid JSON/Go field access statement, such as desiredState.manifest.containers[2]. For example, if the object reference is to a container within a pod, this would take on a value like: \"spec.containers{name}\" (where \"name\" refers to the name of the container that triggered the event) or if no container name is specified \"spec.containers[2]\" (container with index 2 in this pod). This syntax is chosen only to have some well-defined way of referencing a part of an object. TODO: this design is not final and this field is subject to change in the future.","type":"string"},"kind":{"description":"Kind of the referent. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"name":{"description":"Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names","type":"string"},"namespace":{"description":"Namespace of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/namespaces/","type":"string"},"resourceVersion":{"description":"Specific resourceVersion to which this reference is made, if any. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#concurrency-control-and-consistency","type":"string"},"uid":{"description":"UID of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#uids","type":"string"}}}}},"status":{"description":"status represents the current information of a snapshot.","type":"object","properties":{"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it indicates the creation time is unknown. The format of this field is a Unix nanoseconds time encoded as an int64. On Unix, the command `date +%s%N` returns the current time in nanoseconds since 1970-01-01 00:00:00 UTC.","type":"integer","format":"int64"},"error":{"description":"error is the last observed error during snapshot creation, if any. Upon success after retry, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if a snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the complete size of the snapshot in bytes. In dynamic snapshot creation case, this field will be filled in by the CSI snapshotter sidecar with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"integer","format":"int64","minimum":0},"snapshotHandle":{"description":"snapshotHandle is the CSI \"snapshot_id\" of a snapshot on the underlying storage system. If not specified, it indicates that dynamic snapshot creation has either failed or it is still in progress.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"RestoreSize","type":"integer","description":"Represents the complete size of the snapshot in bytes","jsonPath":".status.restoreSize"},{"name":"DeletionPolicy","type":"string","description":"Determines whether this VolumeSnapshotContent and its physical snapshot on the underlying storage system should be deleted when its bound VolumeSnapshot is deleted.","jsonPath":".spec.deletionPolicy"},{"name":"Driver","type":"string","description":"Name of the CSI driver used to create the physical snapshot on the underlying storage system.","jsonPath":".spec.driver"},{"name":"VolumeSnapshotClass","type":"string","description":"Name of the VolumeSnapshotClass to which this snapshot belongs.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"VolumeSnapshot","type":"string","description":"Name of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.name"},{"name":"VolumeSnapshotNamespace","type":"string","description":"Namespace of the VolumeSnapshot object to which this VolumeSnapshotContent object is bound.","jsonPath":".spec.volumeSnapshotRef.namespace"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/955"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshotcontents","singular":"volumesnapshotcontent","shortNames":["vsc","vscs"],"kind":"VolumeSnapshotContent","listKind":"VolumeSnapshotContentList"},"storedVersions":["v1"]}}config/crd/volumesnapshots.snapshot.storage.k8s.io.json0000640000000000000000000004563015156522210022044 0ustar0000000000000000{"metadata":{"name":"volumesnapshots.snapshot.storage.k8s.io","uid":"3fd4c149-4246-48f6-897e-6a65e3f5ae70","resourceVersion":"6079","generation":1,"creationTimestamp":"2026-03-18T13:08:39Z","annotations":{"api-approved.kubernetes.io":"https://github.com/kubernetes-csi/external-snapshotter/pull/814","controller-gen.kubebuilder.io/version":"v0.15.0"}},"spec":{"group":"snapshot.storage.k8s.io","names":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"scope":"Namespaced","versions":[{"name":"v1","served":true,"storage":true,"schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time\nsnapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object.\nServers should convert recognized schemas to the latest internal value, and\nmay reject unrecognized values.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents.\nServers may infer this from the endpoint the client submits requests to.\nCannot be updated.\nIn CamelCase.\nMore info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"metadata":{"type":"object"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user.\nMore info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots\nRequired.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from.\nThis field is immutable after creation.\nRequired.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim\nobject representing the volume from which a snapshot should be created.\nThis PVC is assumed to be in the same namespace as the VolumeSnapshot\nobject.\nThis field should be set if the snapshot does not exists, and needs to be\ncreated.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"persistentVolumeClaimName is immutable"}]},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent\nobject representing an existing volume snapshot.\nThis field should be set if the snapshot already exists and only needs a representation in Kubernetes.\nThis field is immutable.","type":"string","x-kubernetes-validations":[{"rule":"self == oldSelf","message":"volumeSnapshotContentName is immutable"}]}},"x-kubernetes-validations":[{"rule":"!has(oldSelf.persistentVolumeClaimName) || has(self.persistentVolumeClaimName)","message":"persistentVolumeClaimName is required once set"},{"rule":"!has(oldSelf.volumeSnapshotContentName) || has(self.volumeSnapshotContentName)","message":"volumeSnapshotContentName is required once set"},{"rule":"(has(self.volumeSnapshotContentName) \u0026\u0026 !has(self.persistentVolumeClaimName)) || (!has(self.volumeSnapshotContentName) \u0026\u0026 has(self.persistentVolumeClaimName))","message":"exactly one of volumeSnapshotContentName and persistentVolumeClaimName must be set"}]},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass\nrequested by the VolumeSnapshot.\nVolumeSnapshotClassName may be left nil to indicate that the default\nSnapshotClass should be used.\nA given cluster may have multiple default Volume SnapshotClasses: one\ndefault per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass,\nVolumeSnapshotSource will be checked to figure out what the associated\nCSI Driver is, and the default VolumeSnapshotClass associated with that\nCSI Driver will be used. If more than one VolumeSnapshotClass exist for\na given CSI Driver and more than one have been marked as default,\nCreateSnapshot will fail and generate an event.\nEmpty string is not allowed for this field.","type":"string","x-kubernetes-validations":[{"rule":"size(self) \u003e 0","message":"volumeSnapshotClassName must not be the empty string when set"}]}}},"status":{"description":"status represents the current information of a snapshot.\nConsumers must verify binding between VolumeSnapshot and\nVolumeSnapshotContent objects is successful (by validating that both\nVolumeSnapshot and VolumeSnapshotContent point at each other) before\nusing this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent\nobject to which this VolumeSnapshot object intends to bind to.\nIf not specified, it indicates that the VolumeSnapshot object has not been\nsuccessfully bound to a VolumeSnapshotContent object yet.\nNOTE: To avoid possible security issues, consumers must verify binding between\nVolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that\nboth VolumeSnapshot and VolumeSnapshotContent point at each other) before using\nthis object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken\nby the underlying storage system.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"creation_time\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"creation_time\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nIf not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any.\nThis field could be helpful to upper level controllers(i.e., application controller)\nto decide whether they should continue on waiting for the snapshot to be created\nbased on the type of error reported.\nThe snapshot controller will keep retrying when an error occurs during the\nsnapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot\ncreation if specified.\nNOTE: message may be logged, and it should not contain sensitive\ninformation.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"ready_to_use\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"ready_to_use\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it,\notherwise, this field will be set to \"True\".\nIf not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume\nfrom this snapshot.\nIn dynamic snapshot creation case, this field will be filled in by the\nsnapshot controller with the \"size_bytes\" value returned from CSI\n\"CreateSnapshot\" gRPC call.\nFor a pre-existing snapshot, this field will be filled with the \"size_bytes\"\nvalue returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it.\nWhen restoring a volume from this snapshot, the size of the volume MUST NOT\nbe smaller than the restoreSize if it is specified, otherwise the restoration will fail.\nIf not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true},"volumeGroupSnapshotName":{"description":"VolumeGroupSnapshotName is the name of the VolumeGroupSnapshot of which this\nVolumeSnapshot is a part of.","type":"string"}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]},{"name":"v1beta1","served":false,"storage":false,"deprecated":true,"deprecationWarning":"snapshot.storage.k8s.io/v1beta1 VolumeSnapshot is deprecated; use snapshot.storage.k8s.io/v1 VolumeSnapshot","schema":{"openAPIV3Schema":{"description":"VolumeSnapshot is a user's request for either creating a point-in-time snapshot of a persistent volume, or binding to a pre-existing snapshot.","type":"object","required":["spec"],"properties":{"apiVersion":{"description":"APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources","type":"string"},"kind":{"description":"Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds","type":"string"},"spec":{"description":"spec defines the desired characteristics of a snapshot requested by a user. More info: https://kubernetes.io/docs/concepts/storage/volume-snapshots#volumesnapshots Required.","type":"object","required":["source"],"properties":{"source":{"description":"source specifies where a snapshot will be created from. This field is immutable after creation. Required.","type":"object","properties":{"persistentVolumeClaimName":{"description":"persistentVolumeClaimName specifies the name of the PersistentVolumeClaim object representing the volume from which a snapshot should be created. This PVC is assumed to be in the same namespace as the VolumeSnapshot object. This field should be set if the snapshot does not exists, and needs to be created. This field is immutable.","type":"string"},"volumeSnapshotContentName":{"description":"volumeSnapshotContentName specifies the name of a pre-existing VolumeSnapshotContent object representing an existing volume snapshot. This field should be set if the snapshot already exists and only needs a representation in Kubernetes. This field is immutable.","type":"string"}}},"volumeSnapshotClassName":{"description":"VolumeSnapshotClassName is the name of the VolumeSnapshotClass requested by the VolumeSnapshot. VolumeSnapshotClassName may be left nil to indicate that the default SnapshotClass should be used. A given cluster may have multiple default Volume SnapshotClasses: one default per CSI Driver. If a VolumeSnapshot does not specify a SnapshotClass, VolumeSnapshotSource will be checked to figure out what the associated CSI Driver is, and the default VolumeSnapshotClass associated with that CSI Driver will be used. If more than one VolumeSnapshotClass exist for a given CSI Driver and more than one have been marked as default, CreateSnapshot will fail and generate an event. Empty string is not allowed for this field.","type":"string"}}},"status":{"description":"status represents the current information of a snapshot. Consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"object","properties":{"boundVolumeSnapshotContentName":{"description":"boundVolumeSnapshotContentName is the name of the VolumeSnapshotContent object to which this VolumeSnapshot object intends to bind to. If not specified, it indicates that the VolumeSnapshot object has not been successfully bound to a VolumeSnapshotContent object yet. NOTE: To avoid possible security issues, consumers must verify binding between VolumeSnapshot and VolumeSnapshotContent objects is successful (by validating that both VolumeSnapshot and VolumeSnapshotContent point at each other) before using this object.","type":"string"},"creationTime":{"description":"creationTime is the timestamp when the point-in-time snapshot is taken by the underlying storage system. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"creation_time\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"creation_time\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. If not specified, it may indicate that the creation time of the snapshot is unknown.","type":"string","format":"date-time"},"error":{"description":"error is the last observed error during snapshot creation, if any. This field could be helpful to upper level controllers(i.e., application controller) to decide whether they should continue on waiting for the snapshot to be created based on the type of error reported. The snapshot controller will keep retrying when an error occurs during the snapshot creation. Upon success, this error field will be cleared.","type":"object","properties":{"message":{"description":"message is a string detailing the encountered error during snapshot creation if specified. NOTE: message may be logged, and it should not contain sensitive information.","type":"string"},"time":{"description":"time is the timestamp when the error was encountered.","type":"string","format":"date-time"}}},"readyToUse":{"description":"readyToUse indicates if the snapshot is ready to be used to restore a volume. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"ready_to_use\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"ready_to_use\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it, otherwise, this field will be set to \"True\". If not specified, it means the readiness of a snapshot is unknown.","type":"boolean"},"restoreSize":{"description":"restoreSize represents the minimum size of volume required to create a volume from this snapshot. In dynamic snapshot creation case, this field will be filled in by the snapshot controller with the \"size_bytes\" value returned from CSI \"CreateSnapshot\" gRPC call. For a pre-existing snapshot, this field will be filled with the \"size_bytes\" value returned from the CSI \"ListSnapshots\" gRPC call if the driver supports it. When restoring a volume from this snapshot, the size of the volume MUST NOT be smaller than the restoreSize if it is specified, otherwise the restoration will fail. If not specified, it indicates that the size is unknown.","type":"string","pattern":"^(\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\\+|-)?(([0-9]+(\\.[0-9]*)?)|(\\.[0-9]+))))?$","x-kubernetes-int-or-string":true}}}}}},"subresources":{"status":{}},"additionalPrinterColumns":[{"name":"ReadyToUse","type":"boolean","description":"Indicates if the snapshot is ready to be used to restore a volume.","jsonPath":".status.readyToUse"},{"name":"SourcePVC","type":"string","description":"If a new snapshot needs to be created, this contains the name of the source PVC from which this snapshot was (or will be) created.","jsonPath":".spec.source.persistentVolumeClaimName"},{"name":"SourceSnapshotContent","type":"string","description":"If a snapshot already exists, this contains the name of the existing VolumeSnapshotContent object representing the existing snapshot.","jsonPath":".spec.source.volumeSnapshotContentName"},{"name":"RestoreSize","type":"string","description":"Represents the minimum size of volume required to rehydrate from this snapshot.","jsonPath":".status.restoreSize"},{"name":"SnapshotClass","type":"string","description":"The name of the VolumeSnapshotClass requested by the VolumeSnapshot.","jsonPath":".spec.volumeSnapshotClassName"},{"name":"SnapshotContent","type":"string","description":"Name of the VolumeSnapshotContent object to which the VolumeSnapshot object intends to bind to. Please note that verification of binding actually requires checking both VolumeSnapshot and VolumeSnapshotContent to ensure both are pointing at each other. Binding MUST be verified prior to usage of this object.","jsonPath":".status.boundVolumeSnapshotContentName"},{"name":"CreationTime","type":"date","description":"Timestamp when the point-in-time snapshot was taken by the underlying storage system.","jsonPath":".status.creationTime"},{"name":"Age","type":"date","jsonPath":".metadata.creationTimestamp"}]}],"conversion":{"strategy":"None"}},"status":{"conditions":[{"type":"KubernetesAPIApprovalPolicyConformant","status":"True","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"ApprovedAnnotation","message":"approved in https://github.com/kubernetes-csi/external-snapshotter/pull/814"},{"type":"NamesAccepted","status":"True","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"NoConflicts","message":"no conflicts found"},{"type":"Established","status":"True","lastTransitionTime":"2026-03-18T13:08:39Z","reason":"InitialNamesAccepted","message":"the initial names have been accepted"}],"acceptedNames":{"plural":"volumesnapshots","singular":"volumesnapshot","shortNames":["vs"],"kind":"VolumeSnapshot","listKind":"VolumeSnapshotList"},"storedVersions":["v1"]}}config/featuregate.json0000640000000000000000000000613615156522210013701 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"b1f628da-0fb5-4c61-8371-048683afb821","resourceVersion":"647","generation":1,"creationTimestamp":"2026-03-18T13:01:50Z","annotations":{"include.release.openshift.io/self-managed-high-availability":"true"}},"spec":{},"status":{"featureGates":[{"version":"4.18.35","enabled":[{"name":"AWSEFSDriverVolumeMetrics"},{"name":"AdminNetworkPolicy"},{"name":"AlibabaPlatform"},{"name":"AzureWorkloadIdentity"},{"name":"BareMetalLoadBalancer"},{"name":"BuildCSIVolumes"},{"name":"ChunkSizeMiB"},{"name":"CloudDualStackNodeIPs"},{"name":"DisableKubeletCloudCredentialProviders"},{"name":"GCPLabelsTags"},{"name":"HardwareSpeed"},{"name":"IngressControllerLBSubnetsAWS"},{"name":"KMSv1"},{"name":"ManagedBootImages"},{"name":"ManagedBootImagesAWS"},{"name":"MultiArchInstallAWS"},{"name":"MultiArchInstallGCP"},{"name":"NetworkDiagnosticsConfig"},{"name":"NetworkLiveMigration"},{"name":"NetworkSegmentation"},{"name":"NewOLM"},{"name":"NodeDisruptionPolicy"},{"name":"OnClusterBuild"},{"name":"PersistentIPsForVirtualization"},{"name":"PrivateHostedZoneAWS"},{"name":"SetEIPForNLBIngressController"},{"name":"StreamingCollectionEncodingToJSON"},{"name":"StreamingCollectionEncodingToProtobuf"},{"name":"VSphereControlPlaneMachineSet"},{"name":"VSphereDriverConfiguration"},{"name":"VSphereMultiVCenters"},{"name":"VSphereStaticIPs"},{"name":"ValidatingAdmissionPolicy"}],"disabled":[{"name":"AWSClusterHostedDNS"},{"name":"AdditionalRoutingCapabilities"},{"name":"AutomatedEtcdBackup"},{"name":"BootcNodeManagement"},{"name":"CSIDriverSharedResource"},{"name":"ClusterAPIInstall"},{"name":"ClusterAPIInstallIBMCloud"},{"name":"ClusterMonitoringConfig"},{"name":"ConsolePluginContentSecurityPolicy"},{"name":"DNSNameResolver"},{"name":"DynamicResourceAllocation"},{"name":"EtcdBackendQuota"},{"name":"EventedPLEG"},{"name":"Example"},{"name":"ExternalOIDC"},{"name":"ExternalOIDCWithUIDAndExtraClaimMappings"},{"name":"GCPClusterHostedDNS"},{"name":"GatewayAPI"},{"name":"ImageStreamImportMode"},{"name":"IngressControllerDynamicConfigurationManager"},{"name":"InsightsConfig"},{"name":"InsightsConfigAPI"},{"name":"InsightsOnDemandDataGather"},{"name":"InsightsRuntimeExtractor"},{"name":"MachineAPIMigration"},{"name":"MachineAPIOperatorDisableMachineHealthCheckController"},{"name":"MachineAPIProviderOpenStack"},{"name":"MachineConfigNodes"},{"name":"MaxUnavailableStatefulSet"},{"name":"MetricsCollectionProfiles"},{"name":"MinimumKubeletVersion"},{"name":"MixedCPUsAllocation"},{"name":"MultiArchInstallAzure"},{"name":"NodeSwap"},{"name":"NutanixMultiSubnets"},{"name":"OVNObservability"},{"name":"OpenShiftPodSecurityAdmission"},{"name":"PinnedImages"},{"name":"PlatformOperators"},{"name":"ProcMountType"},{"name":"RouteAdvertisements"},{"name":"RouteExternalCertificate"},{"name":"ServiceAccountTokenNodeBinding"},{"name":"SignatureStores"},{"name":"SigstoreImageVerification"},{"name":"TranslateStreamCloseWebsocketRequests"},{"name":"UpgradeStatus"},{"name":"UserNamespacesPodSecurityStandards"},{"name":"UserNamespacesSupport"},{"name":"VSphereMultiNetworks"},{"name":"VolumeAttributesClass"},{"name":"VolumeGroupSnapshot"}]}]}}aggregated/unused_machine_configs_count.json0000640000000000000000000000004115156522210020126 0ustar0000000000000000{"unused_machineconfigs_count":9}config/pdbs/openshift-operator-lifecycle-manager/packageserver-pdb.json0000640000000000000000000000173515156522210025117 0ustar0000000000000000{"metadata":{"name":"packageserver-pdb","namespace":"openshift-operator-lifecycle-manager","uid":"53f07349-ba08-4611-9fa6-e6d9b57f5aaf","resourceVersion":"7931","generation":1,"creationTimestamp":"2026-03-18T13:02:17Z","annotations":{"capability.openshift.io/name":"OperatorLifecycleManager","include.release.openshift.io/hypershift":"true","include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9","controller":true}]},"spec":{"selector":{"matchLabels":{"app":"packageserver"}},"maxUnavailable":1},"status":{"observedGeneration":1,"disruptionsAllowed":1,"currentHealthy":1,"desiredHealthy":0,"expectedPods":1,"conditions":[{"type":"DisruptionAllowed","status":"True","observedGeneration":1,"lastTransitionTime":"2026-03-18T13:09:11Z","reason":"SufficientPods","message":""}]}}config/oauth.json0000640000000000000000000000114415156522210012517 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"b01de596-153b-4503-8c16-c5b6d85e2d30","resourceVersion":"1677","generation":1,"creationTimestamp":"2026-03-18T13:02:17Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9"}]},"spec":{"tokenConfig":{},"templates":{"login":{"name":""},"providerSelection":{"name":""},"error":{"name":""}}},"status":{}}config/infrastructure.json0000640000000000000000000000106515156522210014461 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d2e6a912-02f8-46da-bcb0-cf4012cf3f38","resourceVersion":"542","generation":1,"creationTimestamp":"2026-03-18T13:01:28Z"},"spec":{"cloudConfig":{"name":""},"platformSpec":{"type":"None"}},"status":{"infrastructureName":"xxx-xxxxx","platform":"None","platformStatus":{"type":"None"},"etcdDiscoveryDomain":"","apiServerURL":"https://api.sno.openstack.lab:6443","apiServerInternalURI":"https://api-int.sno.openstack.lab:6443","controlPlaneTopology":"SingleReplica","infrastructureTopology":"SingleReplica","cpuPartitioning":"None"}}config/ingress.json0000640000000000000000000000043615156522210013054 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"c0942b7c-e367-4dac-a546-0c40ed59f9be","resourceVersion":"555","generation":1,"creationTimestamp":"2026-03-18T13:01:28Z"},"spec":{"domain":"apps.sno.openstack.lab","loadBalancer":{"platform":{"type":""}}},"status":{"defaultPlacement":"ControlPlane"}}config/apiserver.json0000640000000000000000000000121615156522210013377 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"cf779d8c-8135-46f7-a054-923bc5473714","resourceVersion":"902","generation":1,"creationTimestamp":"2026-03-18T13:02:01Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","oauth-apiserver.openshift.io/secure-token-storage":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9"}]},"spec":{"servingCerts":{},"clientCA":{"name":""},"encryption":{},"audit":{"profile":"Default"}},"status":{}}events/openshift-machine-api.json0000640000000000000000000000352715156522210015615 0ustar0000000000000000{"items":[{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:02:31Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-6f69995874-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:06:15Z","reason":"FailedCreate","message":"Error creating: pods \"cluster-baremetal-operator-6f69995874-\" is forbidden: autoscaling.openshift.io/ManagementCPUsOverride the cluster does not have any nodes","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:06:16Z","reason":"FailedScheduling","message":"0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:08:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:08:04Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:08:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cluster-baremetal-operator-tls\" : secret \"cluster-baremetal-operator-tls\" not found","type":"Warning"},{"namespace":"openshift-machine-api","lastTimestamp":"2026-03-18T13:08:20Z","reason":"FailedMount","message":"MountVolume.SetUp failed for volume \"cert\" : secret \"cluster-baremetal-webhook-server-cert\" not found","type":"Warning"}]}config/node/master-0.json0000640000000000000000000000544615156522210013765 0ustar0000000000000000{"metadata":{"name":"master-0","uid":"91c86903-c481-4337-816d-5d4395974319","resourceVersion":"9890","creationTimestamp":"2026-03-18T13:06:16Z","labels":{"beta.kubernetes.io/arch":"amd64","beta.kubernetes.io/os":"linux","kubernetes.io/arch":"amd64","kubernetes.io/hostname":"master-0","kubernetes.io/os":"linux","node-role.kubernetes.io/control-plane":"","node-role.kubernetes.io/master":"","node.openshift.io/os_id":"rhcos"},"annotations":{"k8s.ovn.org/host-cidrs":"","k8s.ovn.org/l3-gateway-config":"","k8s.ovn.org/node-chassis-id":"","k8s.ovn.org/node-encap-ips":"","k8s.ovn.org/node-id":"","k8s.ovn.org/node-masquerade-subnet":"","k8s.ovn.org/node-primary-ifaddr":"","k8s.ovn.org/node-subnets":"","k8s.ovn.org/node-transit-switch-port-ifaddr":"","k8s.ovn.org/zone-name":"","volumes.kubernetes.io/controller-managed-attach-detach":"true"}},"spec":{"taints":[{"key":"node-role.kubernetes.io/master","effect":"NoSchedule"}]},"status":{"capacity":{"cpu":"12","ephemeral-storage":"209124332Ki","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"32865364Ki","pods":"250"},"allocatable":{"cpu":"11500m","ephemeral-storage":"191655242229","hugepages-1Gi":"0","hugepages-2Mi":"0","memory":"31714388Ki","pods":"250"},"conditions":[{"type":"MemoryPressure","status":"False","lastHeartbeatTime":"2026-03-18T13:11:05Z","lastTransitionTime":"2026-03-18T13:06:16Z","reason":"KubeletHasSufficientMemory","message":"kubelet has sufficient memory available"},{"type":"DiskPressure","status":"False","lastHeartbeatTime":"2026-03-18T13:11:05Z","lastTransitionTime":"2026-03-18T13:06:16Z","reason":"KubeletHasNoDiskPressure","message":"kubelet has no disk pressure"},{"type":"PIDPressure","status":"False","lastHeartbeatTime":"2026-03-18T13:11:05Z","lastTransitionTime":"2026-03-18T13:06:16Z","reason":"KubeletHasSufficientPID","message":"kubelet has sufficient PID available"},{"type":"Ready","status":"True","lastHeartbeatTime":"2026-03-18T13:11:05Z","lastTransitionTime":"2026-03-18T13:07:48Z","reason":"KubeletReady","message":"kubelet is posting ready status"}],"addresses":[{"type":"InternalIP","address":"192.168.32.10"},{"type":"Hostname","address":"master-0"}],"daemonEndpoints":{"kubeletEndpoint":{"Port":10250}},"nodeInfo":{"machineID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","systemUUID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","bootID":"xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx","kernelVersion":"5.14.0-427.113.1.el9_4.x86_64","osImage":"Red Hat Enterprise Linux CoreOS 418.94.202603021444-0","containerRuntimeVersion":"cri-o://1.31.13-8.rhaos4.18.gitd78977c.el9","kubeletVersion":"v1.31.14","kubeProxyVersion":"v1.31.14","operatingSystem":"linux","architecture":"amd64"},"runtimeHandlers":[{"name":"crun","features":{"recursiveReadOnlyMounts":true}},{"name":"","features":{"recursiveReadOnlyMounts":true}},{"name":"runc","features":{"recursiveReadOnlyMounts":true}}]}}config/proxy.json0000640000000000000000000000031315156522210012555 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"d6d4e7b1-d013-49ff-8933-f44f2bfc9934","resourceVersion":"559","generation":1,"creationTimestamp":"2026-03-18T13:01:29Z"},"spec":{"trustedCA":{"name":""}},"status":{}}config/clusteroperator/imageregistry.operator.openshift.io/imagepruner/cluster.json0000640000000000000000000000163115156522210027745 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"ed0a73a2-a083-4fa6-a24f-ba9c30d17a02","resourceVersion":"6643","generation":1,"creationTimestamp":"2026-03-18T13:08:46Z"},"spec":{"schedule":"","suspend":false,"keepTagRevisions":3,"successfulJobsHistoryLimit":3,"failedJobsHistoryLimit":3,"ignoreInvalidImageReferences":true,"logLevel":"Normal"},"status":{"observedGeneration":1,"conditions":[{"type":"Available","status":"True","lastTransitionTime":"2026-03-18T13:08:47Z","reason":"AsExpected","message":"Pruner CronJob has been created"},{"type":"Failed","status":"False","lastTransitionTime":"2026-03-18T13:08:47Z","reason":"Complete","message":"Pruner completed successfully"},{"type":"Scheduled","status":"True","lastTransitionTime":"2026-03-18T13:08:47Z","reason":"Scheduled","message":"The pruner job has been scheduled"},{"type":"Degraded","status":"False","lastTransitionTime":"2026-03-18T13:08:47Z","reason":"AsExpected"}]}}config/network.json0000640000000000000000000000117015156522210013067 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"e9766a76-61d7-42e6-a6d3-e001199084e7","resourceVersion":"3218","generation":2,"creationTimestamp":"2026-03-18T13:01:29Z"},"spec":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","externalIP":{"policy":{}},"networkDiagnostics":{"mode":"","sourcePlacement":{"nodeSelector":null,"tolerations":null},"targetPlacement":{"nodeSelector":null,"tolerations":null}}},"status":{"clusterNetwork":[{"cidr":"10.128.0.0/16","hostPrefix":23}],"serviceNetwork":["172.30.0.0/16"],"networkType":"OVNKubernetes","clusterNetworkMTU":8900}}config/authentication.json0000640000000000000000000000116515156522210014421 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"bad010b6-7327-4502-8eba-043e4007669c","resourceVersion":"1170","generation":1,"creationTimestamp":"2026-03-18T13:02:07Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9"}]},"spec":{"type":"","oauthMetadata":{"name":""},"serviceAccountIssuer":""},"status":{"integratedOAuthMetadata":{"name":""},"oidcClients":null}}config/image.json0000640000000000000000000000111715156522210012461 0ustar0000000000000000{"metadata":{"name":"cluster","uid":"0b47f9ad-39e4-43fa-989f-d2775551aaae","resourceVersion":"1602","generation":1,"creationTimestamp":"2026-03-18T13:02:15Z","annotations":{"include.release.openshift.io/ibm-cloud-managed":"true","include.release.openshift.io/self-managed-high-availability":"true","release.openshift.io/create-only":"true"},"ownerReferences":[{"apiVersion":"config.openshift.io/v1","kind":"ClusterVersion","name":"version","uid":"6210159d-ccfe-4286-96d1-b40f985a8ec9"}]},"spec":{"additionalTrustedCA":{"name":""},"registrySources":{},"imageStreamImportMode":""},"status":{}}