home/zuul/zuul-output/ 0000755 0001750 0001750 00000000000 15147273724 014136 5 ustar zuul zuul home/zuul/zuul-output/logs/ 0000755 0001750 0001750 00000000000 15147276654 015107 5 ustar zuul zuul home/zuul/zuul-output/logs/ci-framework-data/ 0000755 0001750 0001750 00000000000 15147276575 020406 5 ustar zuul zuul home/zuul/zuul-output/logs/ci-framework-data/logs/ 0000755 0001750 0001750 00000000000 15147276562 021346 5 ustar zuul zuul home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/ 0000755 0001750 0001750 00000000000 15147276540 025567 5 ustar zuul zuul home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/must-gather.logs 0000644 0001750 0001750 00000005406 15147276441 030722 0 ustar zuul zuul [must-gather ] OUT 2026-02-24T10:25:04.572591542Z Using must-gather plug-in image: quay.io/openstack-k8s-operators/openstack-must-gather:latest
When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information:
ClusterID:
ClientVersion: 4.21.1
ClusterVersion: Stable at "4.18.1"
ClusterOperators:
clusteroperator/machine-config is degraded because Failed to resync 4.18.1 because: error during syncRequiredMachineConfigPools: [context deadline exceeded, error MachineConfigPool master is not ready, retrying. Status: (pool degraded: true total: 1, ready 0, updated: 0, unavailable: 1)]
clusteroperator/cloud-credential is missing
clusteroperator/cluster-autoscaler is missing
clusteroperator/insights is missing
clusteroperator/monitoring is missing
clusteroperator/storage is missing
[must-gather ] OUT 2026-02-24T10:25:04.608852091Z namespace/openshift-must-gather-jxp4q created
[must-gather ] OUT 2026-02-24T10:25:04.614124513Z clusterrolebinding.rbac.authorization.k8s.io/must-gather-cw5ll created
[must-gather ] OUT 2026-02-24T10:25:04.640125496Z pod for plug-in image quay.io/openstack-k8s-operators/openstack-must-gather:latest created
[must-gather-vsghw] OUT 2026-02-24T10:25:14.6547993Z gather logs unavailable: Get "https://192.168.126.11:10250/containerLogs/openshift-must-gather-jxp4q/must-gather-vsghw/gather?follow=true×tamps=true": remote error: tls: internal error
[must-gather-vsghw] OUT 2026-02-24T10:25:14.654843401Z waiting for gather to complete
[must-gather-vsghw] OUT 2026-02-24T10:27:44.673193562Z downloading gather output
[must-gather-vsghw] OUT 2026-02-24T10:27:45.153251454Z gather output not downloaded: [Get "https://192.168.126.11:10250/containerLogs/openshift-must-gather-jxp4q/must-gather-vsghw/gather?timestamps=true": remote error: tls: internal error, No available strategies to copy.]
[must-gather-vsghw] OUT 2026-02-24T10:27:45.15384788Z
[must-gather ] OUT 2026-02-24T10:27:45.159526654Z namespace/openshift-must-gather-jxp4q deleted
Reprinting Cluster State:
When opening a support case, bugzilla, or issue please include the following summary data along with any other requested information:
ClusterID:
ClientVersion: 4.21.1
ClusterVersion: Stable at "4.18.1"
ClusterOperators:
clusteroperator/machine-config is degraded because Failed to resync 4.18.1 because: error during syncRequiredMachineConfigPools: [context deadline exceeded, error MachineConfigPool master is not ready, retrying. Status: (pool degraded: true total: 1, ready 0, updated: 0, unavailable: 1)]
clusteroperator/cloud-credential is missing
clusteroperator/cluster-autoscaler is missing
clusteroperator/insights is missing
clusteroperator/monitoring is missing
clusteroperator/storage is missing
home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/timestamp 0000644 0001750 0001750 00000000157 15147276441 027520 0 ustar zuul zuul 2026-02-24 10:25:04.62103765 +0000 UTC m=+0.169835357
2026-02-24 10:27:45.153731306 +0000 UTC m=+160.702528993
home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/event-filter.html 0000644 0001750 0001750 00000006410 15147276441 031062 0 ustar zuul zuul
Events
Time
Namespace
Component
RelatedObject
Reason
Message
././@LongLink 0000644 0000000 0000000 00000000176 00000000000 011606 K ustar root root quay-io-openstack-k8s-operators-openstack-must-gather-sha256-1663223401da21aaf5f4d8d59101f0d65b9026b7fe7df6e028cefcd367dd2d15 home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/latest 0000777 0001750 0001750 00000000000 15147276441 047351 2quay-io-openstack-k8s-operators-openstack-must-gather-sha256-1663223401da21aaf5f4d8d59101f0d65b9026bustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000307 00000000000 011603 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/quay-io-openstack-k8s-operators-openstack-must-gather-sha256-1663223401da21aaf5f4d8d59101f0d65b9026b7fe7df6e028cefcd367dd2d15/ home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/quay-io-openstack-k8s-operat0000755 0001750 0001750 00000000000 15147276540 033054 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000322 00000000000 011600 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/quay-io-openstack-k8s-operators-openstack-must-gather-sha256-1663223401da21aaf5f4d8d59101f0d65b9026b7fe7df6e028cefcd367dd2d15/gather.logs home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/quay-io-openstack-k8s-operat0000644 0001750 0001750 00000000000 15147276440 033043 0 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000336 00000000000 011605 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/quay-io-openstack-k8s-operators-openstack-must-gather-sha256-1663223401da21aaf5f4d8d59101f0d65b9026b7fe7df6e028cefcd367dd2d15/openstack-nodes-top.log home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/quay-io-openstack-k8s-operat0000644 0001750 0001750 00000000000 15147276442 033045 0 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000341 00000000000 011601 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/quay-io-openstack-k8s-operators-openstack-must-gather-sha256-1663223401da21aaf5f4d8d59101f0d65b9026b7fe7df6e028cefcd367dd2d15/all-containers-cpu-top.log home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/quay-io-openstack-k8s-operat0000644 0001750 0001750 00000000000 15147276455 033051 0 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000344 00000000000 011604 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/quay-io-openstack-k8s-operators-openstack-must-gather-sha256-1663223401da21aaf5f4d8d59101f0d65b9026b7fe7df6e028cefcd367dd2d15/all-containers-memory-top.log home/zuul/zuul-output/logs/ci-framework-data/logs/openstack-must-gather/quay-io-openstack-k8s-operat0000644 0001750 0001750 00000000000 15147276470 033046 0 ustar zuul zuul home/zuul/zuul-output/logs/ci-framework-data/logs/2026-02-24_10-24/ 0000775 0001750 0001750 00000000000 15147276563 023127 5 ustar zuul zuul home/zuul/zuul-output/logs/ci-framework-data/logs/2026-02-24_10-24/ansible.log 0000666 0001750 0001750 00000572150 15147276127 025257 0 ustar zuul zuul 2026-02-24 10:19:13,206 p=31356 u=zuul n=ansible | Starting galaxy collection install process
2026-02-24 10:19:13,207 p=31356 u=zuul n=ansible | Process install dependency map
2026-02-24 10:19:27,472 p=31356 u=zuul n=ansible | Starting collection install process
2026-02-24 10:19:27,472 p=31356 u=zuul n=ansible | Installing 'cifmw.general:1.0.0+0a0fabf2' to '/home/zuul/.ansible/collections/ansible_collections/cifmw/general'
2026-02-24 10:19:27,822 p=31356 u=zuul n=ansible | Created collection for cifmw.general:1.0.0+0a0fabf2 at /home/zuul/.ansible/collections/ansible_collections/cifmw/general
2026-02-24 10:19:27,822 p=31356 u=zuul n=ansible | cifmw.general:1.0.0+0a0fabf2 was installed successfully
2026-02-24 10:19:27,822 p=31356 u=zuul n=ansible | Installing 'containers.podman:1.16.2' to '/home/zuul/.ansible/collections/ansible_collections/containers/podman'
2026-02-24 10:19:27,861 p=31356 u=zuul n=ansible | Created collection for containers.podman:1.16.2 at /home/zuul/.ansible/collections/ansible_collections/containers/podman
2026-02-24 10:19:27,861 p=31356 u=zuul n=ansible | containers.podman:1.16.2 was installed successfully
2026-02-24 10:19:27,861 p=31356 u=zuul n=ansible | Installing 'community.general:10.0.1' to '/home/zuul/.ansible/collections/ansible_collections/community/general'
2026-02-24 10:19:28,374 p=31356 u=zuul n=ansible | Created collection for community.general:10.0.1 at /home/zuul/.ansible/collections/ansible_collections/community/general
2026-02-24 10:19:28,374 p=31356 u=zuul n=ansible | community.general:10.0.1 was installed successfully
2026-02-24 10:19:28,374 p=31356 u=zuul n=ansible | Installing 'ansible.posix:1.6.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/posix'
2026-02-24 10:19:28,407 p=31356 u=zuul n=ansible | Created collection for ansible.posix:1.6.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/posix
2026-02-24 10:19:28,408 p=31356 u=zuul n=ansible | ansible.posix:1.6.2 was installed successfully
2026-02-24 10:19:28,408 p=31356 u=zuul n=ansible | Installing 'ansible.utils:5.1.2' to '/home/zuul/.ansible/collections/ansible_collections/ansible/utils'
2026-02-24 10:19:28,473 p=31356 u=zuul n=ansible | Created collection for ansible.utils:5.1.2 at /home/zuul/.ansible/collections/ansible_collections/ansible/utils
2026-02-24 10:19:28,474 p=31356 u=zuul n=ansible | ansible.utils:5.1.2 was installed successfully
2026-02-24 10:19:28,474 p=31356 u=zuul n=ansible | Installing 'community.libvirt:1.3.0' to '/home/zuul/.ansible/collections/ansible_collections/community/libvirt'
2026-02-24 10:19:28,490 p=31356 u=zuul n=ansible | Created collection for community.libvirt:1.3.0 at /home/zuul/.ansible/collections/ansible_collections/community/libvirt
2026-02-24 10:19:28,490 p=31356 u=zuul n=ansible | community.libvirt:1.3.0 was installed successfully
2026-02-24 10:19:28,490 p=31356 u=zuul n=ansible | Installing 'community.crypto:2.22.3' to '/home/zuul/.ansible/collections/ansible_collections/community/crypto'
2026-02-24 10:19:28,587 p=31356 u=zuul n=ansible | Created collection for community.crypto:2.22.3 at /home/zuul/.ansible/collections/ansible_collections/community/crypto
2026-02-24 10:19:28,588 p=31356 u=zuul n=ansible | community.crypto:2.22.3 was installed successfully
2026-02-24 10:19:28,588 p=31356 u=zuul n=ansible | Installing 'kubernetes.core:5.0.0' to '/home/zuul/.ansible/collections/ansible_collections/kubernetes/core'
2026-02-24 10:19:28,671 p=31356 u=zuul n=ansible | Created collection for kubernetes.core:5.0.0 at /home/zuul/.ansible/collections/ansible_collections/kubernetes/core
2026-02-24 10:19:28,671 p=31356 u=zuul n=ansible | kubernetes.core:5.0.0 was installed successfully
2026-02-24 10:19:28,671 p=31356 u=zuul n=ansible | Installing 'ansible.netcommon:7.1.0' to '/home/zuul/.ansible/collections/ansible_collections/ansible/netcommon'
2026-02-24 10:19:28,719 p=31356 u=zuul n=ansible | Created collection for ansible.netcommon:7.1.0 at /home/zuul/.ansible/collections/ansible_collections/ansible/netcommon
2026-02-24 10:19:28,719 p=31356 u=zuul n=ansible | ansible.netcommon:7.1.0 was installed successfully
2026-02-24 10:19:28,720 p=31356 u=zuul n=ansible | Installing 'openstack.config_template:2.1.1' to '/home/zuul/.ansible/collections/ansible_collections/openstack/config_template'
2026-02-24 10:19:28,733 p=31356 u=zuul n=ansible | Created collection for openstack.config_template:2.1.1 at /home/zuul/.ansible/collections/ansible_collections/openstack/config_template
2026-02-24 10:19:28,733 p=31356 u=zuul n=ansible | openstack.config_template:2.1.1 was installed successfully
2026-02-24 10:19:28,733 p=31356 u=zuul n=ansible | Installing 'junipernetworks.junos:9.1.0' to '/home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos'
2026-02-24 10:19:28,896 p=31356 u=zuul n=ansible | Created collection for junipernetworks.junos:9.1.0 at /home/zuul/.ansible/collections/ansible_collections/junipernetworks/junos
2026-02-24 10:19:28,896 p=31356 u=zuul n=ansible | junipernetworks.junos:9.1.0 was installed successfully
2026-02-24 10:19:28,896 p=31356 u=zuul n=ansible | Installing 'cisco.ios:9.0.3' to '/home/zuul/.ansible/collections/ansible_collections/cisco/ios'
2026-02-24 10:19:29,074 p=31356 u=zuul n=ansible | Created collection for cisco.ios:9.0.3 at /home/zuul/.ansible/collections/ansible_collections/cisco/ios
2026-02-24 10:19:29,074 p=31356 u=zuul n=ansible | cisco.ios:9.0.3 was installed successfully
2026-02-24 10:19:29,074 p=31356 u=zuul n=ansible | Installing 'mellanox.onyx:1.0.0' to '/home/zuul/.ansible/collections/ansible_collections/mellanox/onyx'
2026-02-24 10:19:29,098 p=31356 u=zuul n=ansible | Created collection for mellanox.onyx:1.0.0 at /home/zuul/.ansible/collections/ansible_collections/mellanox/onyx
2026-02-24 10:19:29,098 p=31356 u=zuul n=ansible | mellanox.onyx:1.0.0 was installed successfully
2026-02-24 10:19:29,099 p=31356 u=zuul n=ansible | Installing 'community.okd:4.0.0' to '/home/zuul/.ansible/collections/ansible_collections/community/okd'
2026-02-24 10:19:29,119 p=31356 u=zuul n=ansible | Created collection for community.okd:4.0.0 at /home/zuul/.ansible/collections/ansible_collections/community/okd
2026-02-24 10:19:29,119 p=31356 u=zuul n=ansible | community.okd:4.0.0 was installed successfully
2026-02-24 10:19:29,119 p=31356 u=zuul n=ansible | Installing '@NAMESPACE@.@NAME@:3.1.4' to '/home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@'
2026-02-24 10:19:29,187 p=31356 u=zuul n=ansible | Created collection for @NAMESPACE@.@NAME@:3.1.4 at /home/zuul/.ansible/collections/ansible_collections/@NAMESPACE@/@NAME@
2026-02-24 10:19:29,187 p=31356 u=zuul n=ansible | @NAMESPACE@.@NAME@:3.1.4 was installed successfully
2026-02-24 10:19:37,913 p=31993 u=zuul n=ansible | PLAY [Remove status flag] ******************************************************
2026-02-24 10:19:37,931 p=31993 u=zuul n=ansible | TASK [Gathering Facts ] ********************************************************
2026-02-24 10:19:37,931 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:37 +0000 (0:00:00.034) 0:00:00.034 ******
2026-02-24 10:19:37,931 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:37 +0000 (0:00:00.033) 0:00:00.033 ******
2026-02-24 10:19:38,779 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:19:38,795 p=31993 u=zuul n=ansible | TASK [Delete success flag if exists path={{ ansible_user_dir }}/cifmw-success, state=absent] ***
2026-02-24 10:19:38,795 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:38 +0000 (0:00:00.863) 0:00:00.898 ******
2026-02-24 10:19:38,795 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:38 +0000 (0:00:00.863) 0:00:00.897 ******
2026-02-24 10:19:39,061 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:19:39,069 p=31993 u=zuul n=ansible | TASK [Inherit from parent scenarios if needed _raw_params=ci/playbooks/tasks/inherit_parent_scenario.yml] ***
2026-02-24 10:19:39,069 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.273) 0:00:01.172 ******
2026-02-24 10:19:39,069 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.273) 0:00:01.170 ******
2026-02-24 10:19:39,082 p=31993 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/ci/playbooks/tasks/inherit_parent_scenario.yml for localhost
2026-02-24 10:19:39,131 p=31993 u=zuul n=ansible | TASK [Inherit from parent parameter file if instructed file={{ item }}] ********
2026-02-24 10:19:39,131 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.062) 0:00:01.234 ******
2026-02-24 10:19:39,131 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.062) 0:00:01.233 ******
2026-02-24 10:19:39,151 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:39,158 p=31993 u=zuul n=ansible | TASK [cifmw_setup : Set custom cifmw PATH reusable fact cifmw_path={{ ansible_user_dir }}/.crc/bin:{{ ansible_user_dir }}/.crc/bin/oc:{{ ansible_user_dir }}/bin:{{ ansible_env.PATH }}, cacheable=True] ***
2026-02-24 10:19:39,158 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.026) 0:00:01.261 ******
2026-02-24 10:19:39,158 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.026) 0:00:01.259 ******
2026-02-24 10:19:39,182 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:19:39,188 p=31993 u=zuul n=ansible | TASK [cifmw_setup : Get customized parameters ci_framework_params={{
hostvars[inventory_hostname] |
dict2items |
selectattr("key", "match",
"^(cifmw|pre|post)_(?!install_yamls|openshift_token|openshift_login|openshift_kubeconfig).*") |
list | items2dict
}}] ***
2026-02-24 10:19:39,188 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.029) 0:00:01.291 ******
2026-02-24 10:19:39,188 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.029) 0:00:01.289 ******
2026-02-24 10:19:39,274 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:19:39,282 p=31993 u=zuul n=ansible | TASK [install_ca : Ensure target directory exists path={{ cifmw_install_ca_trust_dir }}, state=directory, mode=0755] ***
2026-02-24 10:19:39,282 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.094) 0:00:01.385 ******
2026-02-24 10:19:39,282 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.094) 0:00:01.384 ******
2026-02-24 10:19:39,458 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:19:39,464 p=31993 u=zuul n=ansible | TASK [install_ca : Install internal CA from url url={{ cifmw_install_ca_url }}, dest={{ cifmw_install_ca_trust_dir }}, validate_certs={{ cifmw_install_ca_url_validate_certs | default(omit) }}, mode=0644] ***
2026-02-24 10:19:39,464 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.181) 0:00:01.567 ******
2026-02-24 10:19:39,464 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.181) 0:00:01.566 ******
2026-02-24 10:19:39,479 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:39,486 p=31993 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from inline dest={{ cifmw_install_ca_trust_dir }}/cifmw_inline_ca_bundle.crt, content={{ cifmw_install_ca_bundle_inline }}, mode=0644] ***
2026-02-24 10:19:39,486 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.021) 0:00:01.589 ******
2026-02-24 10:19:39,486 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.021) 0:00:01.588 ******
2026-02-24 10:19:39,502 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:39,509 p=31993 u=zuul n=ansible | TASK [install_ca : Install custom CA bundle from file dest={{ cifmw_install_ca_trust_dir }}/{{ cifmw_install_ca_bundle_src | basename }}, src={{ cifmw_install_ca_bundle_src }}, mode=0644] ***
2026-02-24 10:19:39,509 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.023) 0:00:01.612 ******
2026-02-24 10:19:39,509 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.023) 0:00:01.611 ******
2026-02-24 10:19:39,525 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:39,532 p=31993 u=zuul n=ansible | TASK [install_ca : Update ca bundle _raw_params=update-ca-trust] ***************
2026-02-24 10:19:39,532 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.022) 0:00:01.635 ******
2026-02-24 10:19:39,532 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.022) 0:00:01.634 ******
2026-02-24 10:19:39,550 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:39,562 p=31993 u=zuul n=ansible | TASK [repo_setup : Ensure directories are present path={{ cifmw_repo_setup_basedir }}/{{ item }}, state=directory, mode=0755] ***
2026-02-24 10:19:39,562 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.030) 0:00:01.665 ******
2026-02-24 10:19:39,562 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:39 +0000 (0:00:00.030) 0:00:01.664 ******
2026-02-24 10:19:39,723 p=31993 u=zuul n=ansible | changed: [localhost] => (item=tmp)
2026-02-24 10:19:39,874 p=31993 u=zuul n=ansible | changed: [localhost] => (item=artifacts/repositories)
2026-02-24 10:19:40,014 p=31993 u=zuul n=ansible | changed: [localhost] => (item=venv/repo_setup)
2026-02-24 10:19:40,022 p=31993 u=zuul n=ansible | TASK [repo_setup : Make sure git-core package is installed name=git-core, state=present] ***
2026-02-24 10:19:40,022 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:40 +0000 (0:00:00.459) 0:00:02.125 ******
2026-02-24 10:19:40,022 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:40 +0000 (0:00:00.459) 0:00:02.124 ******
2026-02-24 10:19:40,967 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:19:40,973 p=31993 u=zuul n=ansible | TASK [repo_setup : Get repo-setup repository accept_hostkey=True, dest={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, repo={{ cifmw_repo_setup_src }}] ***
2026-02-24 10:19:40,973 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:40 +0000 (0:00:00.950) 0:00:03.076 ******
2026-02-24 10:19:40,973 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:40 +0000 (0:00:00.950) 0:00:03.075 ******
2026-02-24 10:19:42,312 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:19:42,320 p=31993 u=zuul n=ansible | TASK [repo_setup : Initialize python venv and install requirements virtualenv={{ cifmw_repo_setup_venv }}, requirements={{ cifmw_repo_setup_basedir }}/tmp/repo-setup/requirements.txt, virtualenv_command=python3 -m venv --system-site-packages --upgrade-deps] ***
2026-02-24 10:19:42,321 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:42 +0000 (0:00:01.347) 0:00:04.424 ******
2026-02-24 10:19:42,321 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:42 +0000 (0:00:01.347) 0:00:04.422 ******
2026-02-24 10:19:49,785 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:19:49,791 p=31993 u=zuul n=ansible | TASK [repo_setup : Install repo-setup package chdir={{ cifmw_repo_setup_basedir }}/tmp/repo-setup, creates={{ cifmw_repo_setup_venv }}/bin/repo-setup, _raw_params={{ cifmw_repo_setup_venv }}/bin/python setup.py install] ***
2026-02-24 10:19:49,791 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:49 +0000 (0:00:07.470) 0:00:11.894 ******
2026-02-24 10:19:49,791 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:49 +0000 (0:00:07.470) 0:00:11.893 ******
2026-02-24 10:19:50,618 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:19:50,624 p=31993 u=zuul n=ansible | TASK [repo_setup : Set cifmw_repo_setup_dlrn_hash_tag from content provider cifmw_repo_setup_dlrn_hash_tag={{ content_provider_dlrn_md5_hash }}] ***
2026-02-24 10:19:50,624 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:50 +0000 (0:00:00.832) 0:00:12.727 ******
2026-02-24 10:19:50,624 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:50 +0000 (0:00:00.832) 0:00:12.726 ******
2026-02-24 10:19:50,645 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:50,656 p=31993 u=zuul n=ansible | TASK [repo_setup : Run repo-setup _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup {{ cifmw_repo_setup_promotion }} {{ cifmw_repo_setup_additional_repos }} -d {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} -b {{ cifmw_repo_setup_branch }} --rdo-mirror {{ cifmw_repo_setup_rdo_mirror }} {% if cifmw_repo_setup_dlrn_hash_tag | length > 0 %} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif %} -o {{ cifmw_repo_setup_output }}] ***
2026-02-24 10:19:50,656 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:50 +0000 (0:00:00.032) 0:00:12.759 ******
2026-02-24 10:19:50,656 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:50 +0000 (0:00:00.032) 0:00:12.758 ******
2026-02-24 10:19:51,218 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:19:51,224 p=31993 u=zuul n=ansible | TASK [repo_setup : Get component repo url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/component/{{ cifmw_repo_setup_component_name }}/{{ cifmw_repo_setup_component_promotion_tag }}/delorean.repo, dest={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, mode=0644] ***
2026-02-24 10:19:51,224 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:51 +0000 (0:00:00.567) 0:00:13.327 ******
2026-02-24 10:19:51,224 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:51 +0000 (0:00:00.567) 0:00:13.326 ******
2026-02-24 10:19:51,267 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:51,273 p=31993 u=zuul n=ansible | TASK [repo_setup : Rename component repo path={{ cifmw_repo_setup_output }}/{{ cifmw_repo_setup_component_name }}_{{ cifmw_repo_setup_component_promotion_tag }}_delorean.repo, regexp=delorean-component-{{ cifmw_repo_setup_component_name }}, replace={{ cifmw_repo_setup_component_name }}-{{ cifmw_repo_setup_component_promotion_tag }}] ***
2026-02-24 10:19:51,273 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:51 +0000 (0:00:00.049) 0:00:13.376 ******
2026-02-24 10:19:51,273 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:51 +0000 (0:00:00.049) 0:00:13.375 ******
2026-02-24 10:19:51,307 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:51,313 p=31993 u=zuul n=ansible | TASK [repo_setup : Disable component repo in current-podified dlrn repo path={{ cifmw_repo_setup_output }}/delorean.repo, section=delorean-component-{{ cifmw_repo_setup_component_name }}, option=enabled, value=0, mode=0644] ***
2026-02-24 10:19:51,313 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:51 +0000 (0:00:00.039) 0:00:13.416 ******
2026-02-24 10:19:51,313 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:51 +0000 (0:00:00.039) 0:00:13.415 ******
2026-02-24 10:19:51,348 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:51,354 p=31993 u=zuul n=ansible | TASK [repo_setup : Run repo-setup-get-hash _raw_params={{ cifmw_repo_setup_venv }}/bin/repo-setup-get-hash --dlrn-url {{ cifmw_repo_setup_dlrn_uri[:-1] }} --os-version {{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }} --release {{ cifmw_repo_setup_branch }} {% if cifmw_repo_setup_component_name | length > 0 -%} --component {{ cifmw_repo_setup_component_name }} --tag {{ cifmw_repo_setup_component_promotion_tag }} {% else -%} --tag {{cifmw_repo_setup_promotion }} {% endif -%} {% if (cifmw_repo_setup_dlrn_hash_tag | length > 0) and (cifmw_repo_setup_component_name | length <= 0) -%} --dlrn-hash-tag {{ cifmw_repo_setup_dlrn_hash_tag }} {% endif -%} --json] ***
2026-02-24 10:19:51,354 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:51 +0000 (0:00:00.041) 0:00:13.457 ******
2026-02-24 10:19:51,354 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:51 +0000 (0:00:00.041) 0:00:13.456 ******
2026-02-24 10:19:51,759 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:19:51,765 p=31993 u=zuul n=ansible | TASK [repo_setup : Dump full hash in delorean.repo.md5 file content={{ _repo_setup_json['full_hash'] }}
, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] ***
2026-02-24 10:19:51,765 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:51 +0000 (0:00:00.410) 0:00:13.868 ******
2026-02-24 10:19:51,765 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:51 +0000 (0:00:00.410) 0:00:13.867 ******
2026-02-24 10:19:52,315 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:19:52,321 p=31993 u=zuul n=ansible | TASK [repo_setup : Dump current-podified hash url={{ cifmw_repo_setup_dlrn_uri }}/{{ cifmw_repo_setup_os_release }}{{ cifmw_repo_setup_dist_major_version }}-{{ cifmw_repo_setup_branch }}/current-podified/delorean.repo.md5, dest={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5, mode=0644] ***
2026-02-24 10:19:52,321 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.556) 0:00:14.424 ******
2026-02-24 10:19:52,321 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.556) 0:00:14.423 ******
2026-02-24 10:19:52,332 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:52,338 p=31993 u=zuul n=ansible | TASK [repo_setup : Slurp current podified hash src={{ cifmw_repo_setup_basedir }}/artifacts/repositories/delorean.repo.md5] ***
2026-02-24 10:19:52,338 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.016) 0:00:14.441 ******
2026-02-24 10:19:52,338 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.016) 0:00:14.440 ******
2026-02-24 10:19:52,349 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:52,354 p=31993 u=zuul n=ansible | TASK [repo_setup : Update the value of full_hash _repo_setup_json={{ _repo_setup_json | combine({'full_hash': _hash}, recursive=true) }}] ***
2026-02-24 10:19:52,355 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.016) 0:00:14.458 ******
2026-02-24 10:19:52,355 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.016) 0:00:14.456 ******
2026-02-24 10:19:52,365 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:52,371 p=31993 u=zuul n=ansible | TASK [repo_setup : Export hashes facts for further use cifmw_repo_setup_full_hash={{ _repo_setup_json['full_hash'] }}, cifmw_repo_setup_commit_hash={{ _repo_setup_json['commit_hash'] }}, cifmw_repo_setup_distro_hash={{ _repo_setup_json['distro_hash'] }}, cifmw_repo_setup_extended_hash={{ _repo_setup_json['extended_hash'] }}, cifmw_repo_setup_dlrn_api_url={{ _repo_setup_json['dlrn_api_url'] }}, cifmw_repo_setup_dlrn_url={{ _repo_setup_json['dlrn_url'] }}, cifmw_repo_setup_release={{ _repo_setup_json['release'] }}, cacheable=True] ***
2026-02-24 10:19:52,371 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.016) 0:00:14.474 ******
2026-02-24 10:19:52,371 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.016) 0:00:14.473 ******
2026-02-24 10:19:52,392 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:19:52,399 p=31993 u=zuul n=ansible | TASK [repo_setup : Create download directory path={{ cifmw_repo_setup_rhos_release_path }}, state=directory, mode=0755] ***
2026-02-24 10:19:52,400 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.028) 0:00:14.503 ******
2026-02-24 10:19:52,400 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.028) 0:00:14.501 ******
2026-02-24 10:19:52,408 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:52,416 p=31993 u=zuul n=ansible | TASK [repo_setup : Print the URL to request msg={{ cifmw_repo_setup_rhos_release_rpm }}] ***
2026-02-24 10:19:52,417 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.017) 0:00:14.520 ******
2026-02-24 10:19:52,417 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.017) 0:00:14.518 ******
2026-02-24 10:19:52,429 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:52,436 p=31993 u=zuul n=ansible | TASK [Download the RPM name=krb_request] ***************************************
2026-02-24 10:19:52,436 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.019) 0:00:14.539 ******
2026-02-24 10:19:52,436 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.019) 0:00:14.538 ******
2026-02-24 10:19:52,447 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:52,455 p=31993 u=zuul n=ansible | TASK [repo_setup : Install RHOS Release tool name={{
cifmw_repo_setup_rhos_release_rpm
if cifmw_repo_setup_rhos_release_rpm is not url
else cifmw_krb_request_out.path
}}, state=present, disable_gpg_check={{ cifmw_repo_setup_rhos_release_gpg_check | bool }}] ***
2026-02-24 10:19:52,455 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.019) 0:00:14.558 ******
2026-02-24 10:19:52,455 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.019) 0:00:14.557 ******
2026-02-24 10:19:52,466 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:52,473 p=31993 u=zuul n=ansible | TASK [repo_setup : Get rhos-release tool version _raw_params=rhos-release --version] ***
2026-02-24 10:19:52,474 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.018) 0:00:14.577 ******
2026-02-24 10:19:52,474 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.018) 0:00:14.575 ******
2026-02-24 10:19:52,487 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:52,494 p=31993 u=zuul n=ansible | TASK [repo_setup : Print rhos-release tool version msg={{ rr_version.stdout }}] ***
2026-02-24 10:19:52,494 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.020) 0:00:14.597 ******
2026-02-24 10:19:52,494 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.020) 0:00:14.596 ******
2026-02-24 10:19:52,507 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:52,516 p=31993 u=zuul n=ansible | TASK [repo_setup : Generate repos using rhos-release {{ cifmw_repo_setup_rhos_release_args }} _raw_params=rhos-release {{ cifmw_repo_setup_rhos_release_args }} \
-t {{ cifmw_repo_setup_output }}] ***
2026-02-24 10:19:52,516 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.021) 0:00:14.619 ******
2026-02-24 10:19:52,516 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.021) 0:00:14.618 ******
2026-02-24 10:19:52,529 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:52,538 p=31993 u=zuul n=ansible | TASK [repo_setup : Check for /etc/ci/mirror_info.sh path=/etc/ci/mirror_info.sh] ***
2026-02-24 10:19:52,538 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.022) 0:00:14.641 ******
2026-02-24 10:19:52,538 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.022) 0:00:14.640 ******
2026-02-24 10:19:52,731 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:19:52,744 p=31993 u=zuul n=ansible | TASK [repo_setup : Use RDO proxy mirrors chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail
source /etc/ci/mirror_info.sh
sed -i -e "s|https://trunk.rdoproject.org|$NODEPOOL_RDO_PROXY|g" *.repo
] ***
2026-02-24 10:19:52,744 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.205) 0:00:14.847 ******
2026-02-24 10:19:52,745 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.206) 0:00:14.846 ******
2026-02-24 10:19:52,943 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:19:52,949 p=31993 u=zuul n=ansible | TASK [repo_setup : Use RDO CentOS mirrors (remove CentOS 10 conditional when Nodepool mirrors exist) chdir={{ cifmw_repo_setup_output }}, _raw_params=set -o pipefail
source /etc/ci/mirror_info.sh
sed -i -e "s|http://mirror.stream.centos.org|$NODEPOOL_CENTOS_MIRROR|g" *.repo
] ***
2026-02-24 10:19:52,949 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.204) 0:00:15.052 ******
2026-02-24 10:19:52,949 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:52 +0000 (0:00:00.204) 0:00:15.051 ******
2026-02-24 10:19:53,159 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:19:53,166 p=31993 u=zuul n=ansible | TASK [repo_setup : Check for gating.repo file on content provider url=http://{{ content_provider_registry_ip }}:8766/gating.repo] ***
2026-02-24 10:19:53,166 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.217) 0:00:15.269 ******
2026-02-24 10:19:53,166 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.217) 0:00:15.268 ******
2026-02-24 10:19:53,651 p=31993 u=zuul n=ansible | fatal: [localhost]: FAILED! =>
changed: false
elapsed: 0
msg: 'Status code was -1 and not [200]: Request failed: '
redirected: false
status: -1
url: http://38.102.83.234:8766/gating.repo
2026-02-24 10:19:53,651 p=31993 u=zuul n=ansible | ...ignoring
2026-02-24 10:19:53,662 p=31993 u=zuul n=ansible | TASK [repo_setup : Populate gating repo from content provider ip content=[gating-repo]
baseurl=http://{{ content_provider_registry_ip }}:8766/
enabled=1
gpgcheck=0
priority=1
, dest={{ cifmw_repo_setup_output }}/gating.repo, mode=0644] ***
2026-02-24 10:19:53,663 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.496) 0:00:15.766 ******
2026-02-24 10:19:53,663 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.496) 0:00:15.765 ******
2026-02-24 10:19:53,686 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:53,698 p=31993 u=zuul n=ansible | TASK [repo_setup : Check for DLRN repo at the destination path={{ cifmw_repo_setup_output }}/delorean.repo] ***
2026-02-24 10:19:53,699 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.035) 0:00:15.802 ******
2026-02-24 10:19:53,699 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.035) 0:00:15.800 ******
2026-02-24 10:19:53,723 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:53,736 p=31993 u=zuul n=ansible | TASK [repo_setup : Lower the priority of DLRN repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/delorean.repo, regexp=priority=1, replace=priority=20] ***
2026-02-24 10:19:53,736 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.037) 0:00:15.839 ******
2026-02-24 10:19:53,736 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.037) 0:00:15.838 ******
2026-02-24 10:19:53,762 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:53,775 p=31993 u=zuul n=ansible | TASK [repo_setup : Check for DLRN component repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}] ***
2026-02-24 10:19:53,775 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.038) 0:00:15.878 ******
2026-02-24 10:19:53,775 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.038) 0:00:15.877 ******
2026-02-24 10:19:53,798 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:53,804 p=31993 u=zuul n=ansible | TASK [repo_setup : Lower the priority of component repos to allow installation from gating repo path={{ cifmw_repo_setup_output }}/{{ _comp_repo }}, regexp=priority=1, replace=priority=2] ***
2026-02-24 10:19:53,805 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.029) 0:00:15.908 ******
2026-02-24 10:19:53,805 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.029) 0:00:15.906 ******
2026-02-24 10:19:53,830 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:19:53,837 p=31993 u=zuul n=ansible | TASK [repo_setup : Find existing repos from /etc/yum.repos.d directory paths=/etc/yum.repos.d/, patterns=*.repo, recurse=False] ***
2026-02-24 10:19:53,837 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.032) 0:00:15.940 ******
2026-02-24 10:19:53,837 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:53 +0000 (0:00:00.032) 0:00:15.939 ******
2026-02-24 10:19:54,125 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:19:54,133 p=31993 u=zuul n=ansible | TASK [repo_setup : Remove existing repos from /etc/yum.repos.d directory path={{ item }}, state=absent] ***
2026-02-24 10:19:54,133 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:54 +0000 (0:00:00.296) 0:00:16.236 ******
2026-02-24 10:19:54,133 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:54 +0000 (0:00:00.296) 0:00:16.235 ******
2026-02-24 10:19:54,332 p=31993 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos-addons.repo)
2026-02-24 10:19:54,532 p=31993 u=zuul n=ansible | changed: [localhost] => (item=/etc/yum.repos.d/centos.repo)
2026-02-24 10:19:54,545 p=31993 u=zuul n=ansible | TASK [repo_setup : Cleanup existing metadata _raw_params=dnf clean metadata] ***
2026-02-24 10:19:54,545 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:54 +0000 (0:00:00.412) 0:00:16.648 ******
2026-02-24 10:19:54,545 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:54 +0000 (0:00:00.412) 0:00:16.647 ******
2026-02-24 10:19:54,921 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:19:54,934 p=31993 u=zuul n=ansible | TASK [repo_setup : Copy generated repos to /etc/yum.repos.d directory mode=0755, remote_src=True, src={{ cifmw_repo_setup_output }}/, dest=/etc/yum.repos.d] ***
2026-02-24 10:19:54,934 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:54 +0000 (0:00:00.388) 0:00:17.037 ******
2026-02-24 10:19:54,934 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:54 +0000 (0:00:00.388) 0:00:17.036 ******
2026-02-24 10:19:55,215 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:19:55,225 p=31993 u=zuul n=ansible | TASK [ci_setup : Gather variables for each operating system _raw_params={{ item }}] ***
2026-02-24 10:19:55,225 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:55 +0000 (0:00:00.291) 0:00:17.328 ******
2026-02-24 10:19:55,225 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:55 +0000 (0:00:00.291) 0:00:17.327 ******
2026-02-24 10:19:55,253 p=31993 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/ci_setup/vars/redhat.yml)
2026-02-24 10:19:55,260 p=31993 u=zuul n=ansible | TASK [ci_setup : List packages to install var=cifmw_ci_setup_packages] *********
2026-02-24 10:19:55,260 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:55 +0000 (0:00:00.034) 0:00:17.363 ******
2026-02-24 10:19:55,260 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:55 +0000 (0:00:00.034) 0:00:17.362 ******
2026-02-24 10:19:55,272 p=31993 u=zuul n=ansible | ok: [localhost] =>
cifmw_ci_setup_packages:
- bash-completion
- ca-certificates
- git-core
- make
- tar
- tmux
- python3-pip
2026-02-24 10:19:55,278 p=31993 u=zuul n=ansible | TASK [ci_setup : Install needed packages name={{ cifmw_ci_setup_packages }}, state=latest] ***
2026-02-24 10:19:55,278 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:55 +0000 (0:00:00.017) 0:00:17.381 ******
2026-02-24 10:19:55,278 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:19:55 +0000 (0:00:00.017) 0:00:17.380 ******
2026-02-24 10:20:22,817 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:20:22,824 p=31993 u=zuul n=ansible | TASK [ci_setup : Gather version of openshift client _raw_params=oc version --client -o yaml] ***
2026-02-24 10:20:22,824 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:22 +0000 (0:00:27.545) 0:00:44.927 ******
2026-02-24 10:20:22,824 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:22 +0000 (0:00:27.545) 0:00:44.926 ******
2026-02-24 10:20:23,004 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:23,011 p=31993 u=zuul n=ansible | TASK [ci_setup : Ensure openshift client install path is present path={{ cifmw_ci_setup_oc_install_path }}, state=directory, mode=0755] ***
2026-02-24 10:20:23,011 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:23 +0000 (0:00:00.187) 0:00:45.114 ******
2026-02-24 10:20:23,011 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:23 +0000 (0:00:00.187) 0:00:45.113 ******
2026-02-24 10:20:23,177 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:20:23,190 p=31993 u=zuul n=ansible | TASK [ci_setup : Install openshift client src={{ cifmw_ci_setup_openshift_client_download_uri }}/{{ cifmw_ci_setup_openshift_client_version }}/openshift-client-linux.tar.gz, dest={{ cifmw_ci_setup_oc_install_path }}, remote_src=True, mode=0755, creates={{ cifmw_ci_setup_oc_install_path }}/oc] ***
2026-02-24 10:20:23,191 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:23 +0000 (0:00:00.179) 0:00:45.294 ******
2026-02-24 10:20:23,191 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:23 +0000 (0:00:00.179) 0:00:45.293 ******
2026-02-24 10:20:28,327 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:20:28,334 p=31993 u=zuul n=ansible | TASK [ci_setup : Add the OC path to cifmw_path if needed cifmw_path={{ cifmw_ci_setup_oc_install_path }}:{{ ansible_env.PATH }}, cacheable=True] ***
2026-02-24 10:20:28,334 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:28 +0000 (0:00:05.143) 0:00:50.437 ******
2026-02-24 10:20:28,334 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:28 +0000 (0:00:05.143) 0:00:50.436 ******
2026-02-24 10:20:28,353 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:28,360 p=31993 u=zuul n=ansible | TASK [ci_setup : Create completion file] ***************************************
2026-02-24 10:20:28,360 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:28 +0000 (0:00:00.025) 0:00:50.463 ******
2026-02-24 10:20:28,360 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:28 +0000 (0:00:00.025) 0:00:50.462 ******
2026-02-24 10:20:28,657 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:20:28,663 p=31993 u=zuul n=ansible | TASK [ci_setup : Source completion from within .bashrc create=True, mode=0644, path={{ ansible_user_dir }}/.bashrc, block=if [ -f ~/.oc_completion ]; then
source ~/.oc_completion
fi] ***
2026-02-24 10:20:28,663 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:28 +0000 (0:00:00.303) 0:00:50.766 ******
2026-02-24 10:20:28,663 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:28 +0000 (0:00:00.303) 0:00:50.765 ******
2026-02-24 10:20:28,997 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:20:29,004 p=31993 u=zuul n=ansible | TASK [ci_setup : Check rhsm status _raw_params=subscription-manager status] ****
2026-02-24 10:20:29,004 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.340) 0:00:51.107 ******
2026-02-24 10:20:29,004 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.340) 0:00:51.106 ******
2026-02-24 10:20:29,018 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:29,024 p=31993 u=zuul n=ansible | TASK [ci_setup : Gather the repos to be enabled _repos={{
cifmw_ci_setup_rhel_rhsm_default_repos +
(cifmw_ci_setup_rhel_rhsm_extra_repos | default([]))
}}] ***
2026-02-24 10:20:29,024 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.020) 0:00:51.127 ******
2026-02-24 10:20:29,024 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.020) 0:00:51.126 ******
2026-02-24 10:20:29,036 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:29,042 p=31993 u=zuul n=ansible | TASK [ci_setup : Enabling the required repositories. name={{ item }}, state={{ rhsm_repo_state | default('enabled') }}] ***
2026-02-24 10:20:29,042 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.017) 0:00:51.145 ******
2026-02-24 10:20:29,042 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.017) 0:00:51.144 ******
2026-02-24 10:20:29,054 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:29,060 p=31993 u=zuul n=ansible | TASK [ci_setup : Get current /etc/redhat-release _raw_params=cat /etc/redhat-release] ***
2026-02-24 10:20:29,061 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.018) 0:00:51.164 ******
2026-02-24 10:20:29,061 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.018) 0:00:51.163 ******
2026-02-24 10:20:29,072 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:29,077 p=31993 u=zuul n=ansible | TASK [ci_setup : Print current /etc/redhat-release msg={{ _current_rh_release.stdout }}] ***
2026-02-24 10:20:29,078 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.017) 0:00:51.181 ******
2026-02-24 10:20:29,078 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.016) 0:00:51.179 ******
2026-02-24 10:20:29,091 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:29,097 p=31993 u=zuul n=ansible | TASK [ci_setup : Ensure the repos are enabled in the system using yum name={{ item.name }}, baseurl={{ item.baseurl }}, description={{ item.description | default(item.name) }}, gpgcheck={{ item.gpgcheck | default(false) }}, enabled=True, state={{ yum_repo_state | default('present') }}] ***
2026-02-24 10:20:29,097 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.019) 0:00:51.200 ******
2026-02-24 10:20:29,097 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.019) 0:00:51.199 ******
2026-02-24 10:20:29,118 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:29,124 p=31993 u=zuul n=ansible | TASK [ci_setup : Manage directories path={{ item }}, state={{ directory_state }}, mode=0755, owner={{ ansible_user_id }}, group={{ ansible_user_id }}] ***
2026-02-24 10:20:29,124 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.027) 0:00:51.228 ******
2026-02-24 10:20:29,125 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:29 +0000 (0:00:00.027) 0:00:51.226 ******
2026-02-24 10:20:29,353 p=31993 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/manifests/openstack/cr)
2026-02-24 10:20:29,554 p=31993 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/logs)
2026-02-24 10:20:29,712 p=31993 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/tmp)
2026-02-24 10:20:29,910 p=31993 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/volumes)
2026-02-24 10:20:30,066 p=31993 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters)
2026-02-24 10:20:30,077 p=31993 u=zuul n=ansible | TASK [Prepare install_yamls make targets name=install_yamls, apply={'tags': ['bootstrap']}] ***
2026-02-24 10:20:30,077 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.952) 0:00:52.180 ******
2026-02-24 10:20:30,077 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.952) 0:00:52.179 ******
2026-02-24 10:20:30,216 p=31993 u=zuul n=ansible | TASK [install_yamls : Ensure directories exist path={{ item }}, state=directory, mode=0755] ***
2026-02-24 10:20:30,216 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.138) 0:00:52.319 ******
2026-02-24 10:20:30,216 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.138) 0:00:52.318 ******
2026-02-24 10:20:30,399 p=31993 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts)
2026-02-24 10:20:30,598 p=31993 u=zuul n=ansible | changed: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/roles/install_yamls_makes/tasks)
2026-02-24 10:20:30,748 p=31993 u=zuul n=ansible | ok: [localhost] => (item=/home/zuul/ci-framework-data/artifacts/parameters)
2026-02-24 10:20:30,755 p=31993 u=zuul n=ansible | TASK [Create variables with local repos based on Zuul items name=install_yamls, tasks_from=zuul_set_operators_repo.yml] ***
2026-02-24 10:20:30,756 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.539) 0:00:52.859 ******
2026-02-24 10:20:30,756 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.539) 0:00:52.857 ******
2026-02-24 10:20:30,786 p=31993 u=zuul n=ansible | TASK [install_yamls : Set fact with local repos based on Zuul items cifmw_install_yamls_operators_repo={{ cifmw_install_yamls_operators_repo | default({}) | combine(_repo_operator_info | items2dict) }}] ***
2026-02-24 10:20:30,787 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.030) 0:00:52.890 ******
2026-02-24 10:20:30,787 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.030) 0:00:52.888 ******
2026-02-24 10:20:30,827 p=31993 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '3642', 'change_url': 'https://github.com/openstack-k8s-operators/ci-framework/pull/3642', 'commit_id': '0a0fabf27748a46a654846fbfd4fd509fe7466dc', 'patchset': '0a0fabf27748a46a654846fbfd4fd509fe7466dc', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'name': 'openstack-k8s-operators/ci-framework', 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'topic': None})
2026-02-24 10:20:30,829 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:30,834 p=31993 u=zuul n=ansible | TASK [install_yamls : Print helpful data for debugging msg=_repo_operator_name: {{ _repo_operator_name }}
_repo_operator_info: {{ _repo_operator_info }}
cifmw_install_yamls_operators_repo: {{ cifmw_install_yamls_operators_repo }}
] ***
2026-02-24 10:20:30,835 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.048) 0:00:52.938 ******
2026-02-24 10:20:30,835 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.048) 0:00:52.936 ******
2026-02-24 10:20:30,870 p=31993 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '3642', 'change_url': 'https://github.com/openstack-k8s-operators/ci-framework/pull/3642', 'commit_id': '0a0fabf27748a46a654846fbfd4fd509fe7466dc', 'patchset': '0a0fabf27748a46a654846fbfd4fd509fe7466dc', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'name': 'openstack-k8s-operators/ci-framework', 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'topic': None})
2026-02-24 10:20:30,872 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:30,882 p=31993 u=zuul n=ansible | TASK [Customize install_yamls devsetup vars if needed name=install_yamls, tasks_from=customize_devsetup_vars.yml] ***
2026-02-24 10:20:30,883 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.047) 0:00:52.986 ******
2026-02-24 10:20:30,883 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.047) 0:00:52.984 ******
2026-02-24 10:20:30,920 p=31993 u=zuul n=ansible | TASK [install_yamls : Update opm_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^opm_version:, line=opm_version: {{ cifmw_install_yamls_opm_version }}, state=present] ***
2026-02-24 10:20:30,920 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.037) 0:00:53.023 ******
2026-02-24 10:20:30,920 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.037) 0:00:53.022 ******
2026-02-24 10:20:30,942 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:30,948 p=31993 u=zuul n=ansible | TASK [install_yamls : Update sdk_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^sdk_version:, line=sdk_version: {{ cifmw_install_yamls_sdk_version }}, state=present] ***
2026-02-24 10:20:30,948 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.027) 0:00:53.051 ******
2026-02-24 10:20:30,948 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.027) 0:00:53.050 ******
2026-02-24 10:20:30,969 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:30,975 p=31993 u=zuul n=ansible | TASK [install_yamls : Update go_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^go_version:, line=go_version: {{ cifmw_install_yamls_go_version }}, state=present] ***
2026-02-24 10:20:30,975 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.027) 0:00:53.078 ******
2026-02-24 10:20:30,975 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:30 +0000 (0:00:00.027) 0:00:53.077 ******
2026-02-24 10:20:30,997 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:31,003 p=31993 u=zuul n=ansible | TASK [install_yamls : Update kustomize_version in install_yamls devsetup/vars/default.yaml path={{ cifmw_install_yamls_repo }}/devsetup/vars/default.yaml, regexp=^kustomize_version:, line=kustomize_version: {{ cifmw_install_yamls_kustomize_version }}, state=present] ***
2026-02-24 10:20:31,003 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.027) 0:00:53.106 ******
2026-02-24 10:20:31,003 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.027) 0:00:53.105 ******
2026-02-24 10:20:31,024 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:31,041 p=31993 u=zuul n=ansible | TASK [install_yamls : Compute the cifmw_install_yamls_vars final value _install_yamls_override_vars={{
_install_yamls_override_vars | default({}) |
combine(item, recursive=True)
}}] ***
2026-02-24 10:20:31,041 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.038) 0:00:53.144 ******
2026-02-24 10:20:31,041 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.038) 0:00:53.143 ******
2026-02-24 10:20:31,105 p=31993 u=zuul n=ansible | ok: [localhost] => (item={'BMO_SETUP': False, 'INSTALL_CERT_MANAGER': False})
2026-02-24 10:20:31,115 p=31993 u=zuul n=ansible | TASK [install_yamls : Set environment override cifmw_install_yamls_environment fact cifmw_install_yamls_environment={{
_install_yamls_override_vars.keys() |
map('upper') |
zip(_install_yamls_override_vars.values()) |
items2dict(key_name=0, value_name=1) |
combine({
'OUT': cifmw_install_yamls_manifests_dir,
'OUTPUT_DIR': cifmw_install_yamls_edpm_dir,
'CHECKOUT_FROM_OPENSTACK_REF': cifmw_install_yamls_checkout_openstack_ref,
'OPENSTACK_K8S_BRANCH': (zuul is defined and not zuul.branch |regex_search('master|antelope|rhos')) | ternary(zuul.branch, 'main')
}) |
combine(install_yamls_operators_repos)
}}, cacheable=True] ***
2026-02-24 10:20:31,115 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.073) 0:00:53.218 ******
2026-02-24 10:20:31,115 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.073) 0:00:53.217 ******
2026-02-24 10:20:31,148 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:31,153 p=31993 u=zuul n=ansible | TASK [install_yamls : Get environment structure base_path={{ cifmw_install_yamls_repo }}] ***
2026-02-24 10:20:31,153 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.038) 0:00:53.256 ******
2026-02-24 10:20:31,153 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.038) 0:00:53.255 ******
2026-02-24 10:20:31,728 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:31,734 p=31993 u=zuul n=ansible | TASK [install_yamls : Ensure Output directory exists path={{ cifmw_install_yamls_out_dir }}, state=directory, mode=0755] ***
2026-02-24 10:20:31,735 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.581) 0:00:53.838 ******
2026-02-24 10:20:31,735 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.581) 0:00:53.836 ******
2026-02-24 10:20:31,924 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:31,933 p=31993 u=zuul n=ansible | TASK [install_yamls : Ensure user cifmw_install_yamls_vars contains existing Makefile variables that=_cifmw_install_yamls_unmatched_vars | length == 0, msg=cifmw_install_yamls_vars contains a variable that is not defined in install_yamls Makefile nor cifmw_install_yamls_whitelisted_vars: {{ _cifmw_install_yamls_unmatched_vars | join(', ')}}, quiet=True] ***
2026-02-24 10:20:31,933 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.198) 0:00:54.036 ******
2026-02-24 10:20:31,933 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.198) 0:00:54.035 ******
2026-02-24 10:20:31,960 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:31,975 p=31993 u=zuul n=ansible | TASK [install_yamls : Generate /home/zuul/ci-framework-data/artifacts/install_yamls.sh dest={{ cifmw_install_yamls_out_dir }}/{{ cifmw_install_yamls_envfile }}, content={% for k,v in cifmw_install_yamls_environment.items() %}
export {{ k }}={{ v }}
{% endfor %}, mode=0644] ***
2026-02-24 10:20:31,975 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.042) 0:00:54.078 ******
2026-02-24 10:20:31,975 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:31 +0000 (0:00:00.042) 0:00:54.077 ******
2026-02-24 10:20:32,372 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:20:32,379 p=31993 u=zuul n=ansible | TASK [install_yamls : Set install_yamls default values cifmw_install_yamls_defaults={{ get_makefiles_env_output.makefiles_values | combine(cifmw_install_yamls_environment) }}, cacheable=True] ***
2026-02-24 10:20:32,379 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.403) 0:00:54.482 ******
2026-02-24 10:20:32,379 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.403) 0:00:54.481 ******
2026-02-24 10:20:32,412 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:32,420 p=31993 u=zuul n=ansible | TASK [install_yamls : Show the env structure var=cifmw_install_yamls_environment] ***
2026-02-24 10:20:32,420 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.040) 0:00:54.523 ******
2026-02-24 10:20:32,420 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.040) 0:00:54.521 ******
2026-02-24 10:20:32,440 p=31993 u=zuul n=ansible | ok: [localhost] =>
cifmw_install_yamls_environment:
BMO_SETUP: false
CHECKOUT_FROM_OPENSTACK_REF: 'true'
INSTALL_CERT_MANAGER: false
OPENSTACK_K8S_BRANCH: main
OUT: /home/zuul/ci-framework-data/artifacts/manifests
OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm
2026-02-24 10:20:32,448 p=31993 u=zuul n=ansible | TASK [install_yamls : Show the env structure defaults var=cifmw_install_yamls_defaults] ***
2026-02-24 10:20:32,448 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.027) 0:00:54.551 ******
2026-02-24 10:20:32,448 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.027) 0:00:54.549 ******
2026-02-24 10:20:32,481 p=31993 u=zuul n=ansible | ok: [localhost] =>
cifmw_install_yamls_defaults:
ADOPTED_EXTERNAL_NETWORK: 172.21.1.0/24
ADOPTED_INTERNALAPI_NETWORK: 172.17.1.0/24
ADOPTED_STORAGEMGMT_NETWORK: 172.20.1.0/24
ADOPTED_STORAGE_NETWORK: 172.18.1.0/24
ADOPTED_TENANT_NETWORK: 172.9.1.0/24
BARBICAN: config/samples/barbican_v1beta1_barbican.yaml
BARBICAN_BRANCH: main
BARBICAN_COMMIT_HASH: ''
BARBICAN_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/config/samples/barbican_v1beta1_barbican.yaml
BARBICAN_DEPL_IMG: unused
BARBICAN_IMG: quay.io/openstack-k8s-operators/barbican-operator-index:latest
BARBICAN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/kuttl-test.yaml
BARBICAN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/barbican-operator/test/kuttl/tests
BARBICAN_KUTTL_NAMESPACE: barbican-kuttl-tests
BARBICAN_REPO: https://github.com/openstack-k8s-operators/barbican-operator.git
BARBICAN_SERVICE_ENABLED: 'true'
BARBICAN_SIMPLE_CRYPTO_ENCRYPTION_KEY: sEFmdFjDUqRM2VemYslV5yGNWjokioJXsg8Nrlc3drU=
BAREMETAL_BRANCH: main
BAREMETAL_COMMIT_HASH: ''
BAREMETAL_IMG: quay.io/openstack-k8s-operators/openstack-baremetal-operator-index:latest
BAREMETAL_OS_CONTAINER_IMG: ''
BAREMETAL_OS_IMG: ''
BAREMETAL_OS_IMG_TYPE: ''
BAREMETAL_REPO: https://github.com/openstack-k8s-operators/openstack-baremetal-operator.git
BAREMETAL_TIMEOUT: 20m
BASH_IMG: quay.io/openstack-k8s-operators/bash:latest
BGP_ASN: '64999'
BGP_LEAF_1: 100.65.4.1
BGP_LEAF_2: 100.64.4.1
BGP_OVN_ROUTING: 'false'
BGP_PEER_ASN: '64999'
BGP_SOURCE_IP: 172.30.4.2
BGP_SOURCE_IP6: f00d:f00d:f00d:f00d:f00d:f00d:f00d:42
BMAAS_BRIDGE_IPV4_PREFIX: 172.20.1.2/24
BMAAS_BRIDGE_IPV6_PREFIX: fd00:bbbb::2/64
BMAAS_INSTANCE_DISK_SIZE: '20'
BMAAS_INSTANCE_MEMORY: '4096'
BMAAS_INSTANCE_NAME_PREFIX: crc-bmaas
BMAAS_INSTANCE_NET_MODEL: virtio
BMAAS_INSTANCE_OS_VARIANT: centos-stream9
BMAAS_INSTANCE_VCPUS: '2'
BMAAS_INSTANCE_VIRT_TYPE: kvm
BMAAS_IPV4: 'true'
BMAAS_IPV6: 'false'
BMAAS_LIBVIRT_USER: sushyemu
BMAAS_METALLB_ADDRESS_POOL: 172.20.1.64/26
BMAAS_METALLB_POOL_NAME: baremetal
BMAAS_NETWORK_IPV4_PREFIX: 172.20.1.1/24
BMAAS_NETWORK_IPV6_PREFIX: fd00:bbbb::1/64
BMAAS_NETWORK_NAME: crc-bmaas
BMAAS_NODE_COUNT: '1'
BMAAS_OCP_INSTANCE_NAME: crc
BMAAS_REDFISH_PASSWORD: password
BMAAS_REDFISH_USERNAME: admin
BMAAS_ROUTE_LIBVIRT_NETWORKS: crc-bmaas,crc,default
BMAAS_SUSHY_EMULATOR_DRIVER: libvirt
BMAAS_SUSHY_EMULATOR_IMAGE: quay.io/metal3-io/sushy-tools:latest
BMAAS_SUSHY_EMULATOR_NAMESPACE: sushy-emulator
BMAAS_SUSHY_EMULATOR_OS_CLIENT_CONFIG_FILE: /etc/openstack/clouds.yaml
BMAAS_SUSHY_EMULATOR_OS_CLOUD: openstack
BMH_NAMESPACE: openstack
BMO_BRANCH: release-0.9
BMO_CLEANUP: 'true'
BMO_COMMIT_HASH: ''
BMO_IPA_BASEURI: https://tarballs.opendev.org/openstack/ironic-python-agent/dib
BMO_IPA_BRANCH: stable/2024.1
BMO_IPA_FLAVOR: centos9
BMO_IPA_INSECURE: 'false'
BMO_IRONIC_HOST: 192.168.122.10
BMO_PROVISIONING_INTERFACE: ''
BMO_REPO: https://github.com/metal3-io/baremetal-operator
BMO_SETUP: false
BMO_SETUP_ROUTE_REPLACE: 'true'
BM_CTLPLANE_INTERFACE: enp1s0
BM_INSTANCE_MEMORY: '8192'
BM_INSTANCE_NAME_PREFIX: edpm-compute-baremetal
BM_INSTANCE_NAME_SUFFIX: '0'
BM_NETWORK_NAME: default
BM_NODE_COUNT: '1'
BM_ROOT_PASSWORD: ''
BM_ROOT_PASSWORD_SECRET: ''
CEILOMETER_CENTRAL_DEPL_IMG: unused
CEILOMETER_NOTIFICATION_DEPL_IMG: unused
CEPH_BRANCH: release-1.15
CEPH_CLIENT: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/toolbox.yaml
CEPH_COMMON: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/common.yaml
CEPH_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/cluster-test.yaml
CEPH_CRDS: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/crds.yaml
CEPH_IMG: quay.io/ceph/demo:latest-squid
CEPH_OP: /home/zuul/ci-framework-data/artifacts/manifests/operator/rook/deploy/examples/operator-openshift.yaml
CEPH_REPO: https://github.com/rook/rook.git
CERTMANAGER_TIMEOUT: 300s
CHECKOUT_FROM_OPENSTACK_REF: 'true'
CINDER: config/samples/cinder_v1beta1_cinder.yaml
CINDERAPI_DEPL_IMG: unused
CINDERBKP_DEPL_IMG: unused
CINDERSCH_DEPL_IMG: unused
CINDERVOL_DEPL_IMG: unused
CINDER_BRANCH: main
CINDER_COMMIT_HASH: ''
CINDER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/config/samples/cinder_v1beta1_cinder.yaml
CINDER_IMG: quay.io/openstack-k8s-operators/cinder-operator-index:latest
CINDER_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/kuttl-test.yaml
CINDER_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/cinder-operator/test/kuttl/tests
CINDER_KUTTL_NAMESPACE: cinder-kuttl-tests
CINDER_REPO: https://github.com/openstack-k8s-operators/cinder-operator.git
CLEANUP_DIR_CMD: rm -Rf
CRC_BGP_NIC_1_MAC: '52:54:00:11:11:11'
CRC_BGP_NIC_2_MAC: '52:54:00:11:11:12'
CRC_HTTPS_PROXY: ''
CRC_HTTP_PROXY: ''
CRC_STORAGE_NAMESPACE: crc-storage
CRC_STORAGE_RETRIES: '3'
CRC_URL: '''https://developers.redhat.com/content-gateway/rest/mirror/pub/openshift-v4/clients/crc/latest/crc-linux-amd64.tar.xz'''
CRC_VERSION: latest
DATAPLANE_ANSIBLE_SECRET: dataplane-ansible-ssh-private-key-secret
DATAPLANE_ANSIBLE_USER: ''
DATAPLANE_COMPUTE_IP: 192.168.122.100
DATAPLANE_CONTAINER_PREFIX: openstack
DATAPLANE_CONTAINER_TAG: current-podified
DATAPLANE_CUSTOM_SERVICE_RUNNER_IMG: quay.io/openstack-k8s-operators/openstack-ansibleee-runner:latest
DATAPLANE_DEFAULT_GW: 192.168.122.1
DATAPLANE_EXTRA_NOVA_CONFIG_FILE: /dev/null
DATAPLANE_GROWVOLS_ARGS: /=8GB /tmp=1GB /home=1GB /var=100%
DATAPLANE_KUSTOMIZE_SCENARIO: preprovisioned
DATAPLANE_NETWORKER_IP: 192.168.122.200
DATAPLANE_NETWORK_INTERFACE_NAME: eth0
DATAPLANE_NOVA_NFS_PATH: ''
DATAPLANE_NTP_SERVER: pool.ntp.org
DATAPLANE_PLAYBOOK: osp.edpm.download_cache
DATAPLANE_REGISTRY_URL: quay.io/podified-antelope-centos9
DATAPLANE_RUNNER_IMG: ''
DATAPLANE_SERVER_ROLE: compute
DATAPLANE_SSHD_ALLOWED_RANGES: '[''192.168.122.0/24'']'
DATAPLANE_TIMEOUT: 30m
DATAPLANE_TLS_ENABLED: 'true'
DATAPLANE_TOTAL_NETWORKER_NODES: '1'
DATAPLANE_TOTAL_NODES: '1'
DBSERVICE: galera
DESIGNATE: config/samples/designate_v1beta1_designate.yaml
DESIGNATE_BRANCH: main
DESIGNATE_COMMIT_HASH: ''
DESIGNATE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/config/samples/designate_v1beta1_designate.yaml
DESIGNATE_IMG: quay.io/openstack-k8s-operators/designate-operator-index:latest
DESIGNATE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/kuttl-test.yaml
DESIGNATE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/designate-operator/test/kuttl/tests
DESIGNATE_KUTTL_NAMESPACE: designate-kuttl-tests
DESIGNATE_REPO: https://github.com/openstack-k8s-operators/designate-operator.git
DNSDATA: config/samples/network_v1beta1_dnsdata.yaml
DNSDATA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsdata.yaml
DNSMASQ: config/samples/network_v1beta1_dnsmasq.yaml
DNSMASQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_dnsmasq.yaml
DNS_DEPL_IMG: unused
DNS_DOMAIN: localdomain
DOWNLOAD_TOOLS_SELECTION: all
EDPM_ATTACH_EXTNET: 'true'
EDPM_COMPUTE_ADDITIONAL_HOST_ROUTES: '''[]'''
EDPM_COMPUTE_ADDITIONAL_NETWORKS: '''[]'''
EDPM_COMPUTE_CELLS: '1'
EDPM_COMPUTE_CEPH_ENABLED: 'true'
EDPM_COMPUTE_CEPH_NOVA: 'true'
EDPM_COMPUTE_DHCP_AGENT_ENABLED: 'true'
EDPM_COMPUTE_SRIOV_ENABLED: 'true'
EDPM_COMPUTE_SUFFIX: '0'
EDPM_CONFIGURE_DEFAULT_ROUTE: 'true'
EDPM_CONFIGURE_HUGEPAGES: 'false'
EDPM_CONFIGURE_NETWORKING: 'true'
EDPM_FIRSTBOOT_EXTRA: /tmp/edpm-firstboot-extra
EDPM_NETWORKER_SUFFIX: '0'
EDPM_TOTAL_NETWORKERS: '1'
EDPM_TOTAL_NODES: '1'
GALERA_REPLICAS: ''
GENERATE_SSH_KEYS: 'true'
GIT_CLONE_OPTS: ''
GLANCE: config/samples/glance_v1beta1_glance.yaml
GLANCEAPI_DEPL_IMG: unused
GLANCE_BRANCH: main
GLANCE_COMMIT_HASH: ''
GLANCE_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/config/samples/glance_v1beta1_glance.yaml
GLANCE_IMG: quay.io/openstack-k8s-operators/glance-operator-index:latest
GLANCE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/kuttl-test.yaml
GLANCE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/glance-operator/test/kuttl/tests
GLANCE_KUTTL_NAMESPACE: glance-kuttl-tests
GLANCE_REPO: https://github.com/openstack-k8s-operators/glance-operator.git
HEAT: config/samples/heat_v1beta1_heat.yaml
HEATAPI_DEPL_IMG: unused
HEATCFNAPI_DEPL_IMG: unused
HEATENGINE_DEPL_IMG: unused
HEAT_AUTH_ENCRYPTION_KEY: 767c3ed056cbaa3b9dfedb8c6f825bf0
HEAT_BRANCH: main
HEAT_COMMIT_HASH: ''
HEAT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/config/samples/heat_v1beta1_heat.yaml
HEAT_IMG: quay.io/openstack-k8s-operators/heat-operator-index:latest
HEAT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/kuttl-test.yaml
HEAT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/heat-operator/test/kuttl/tests
HEAT_KUTTL_NAMESPACE: heat-kuttl-tests
HEAT_REPO: https://github.com/openstack-k8s-operators/heat-operator.git
HEAT_SERVICE_ENABLED: 'true'
HORIZON: config/samples/horizon_v1beta1_horizon.yaml
HORIZON_BRANCH: main
HORIZON_COMMIT_HASH: ''
HORIZON_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/config/samples/horizon_v1beta1_horizon.yaml
HORIZON_DEPL_IMG: unused
HORIZON_IMG: quay.io/openstack-k8s-operators/horizon-operator-index:latest
HORIZON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/kuttl-test.yaml
HORIZON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/horizon-operator/test/kuttl/tests
HORIZON_KUTTL_NAMESPACE: horizon-kuttl-tests
HORIZON_REPO: https://github.com/openstack-k8s-operators/horizon-operator.git
INFRA_BRANCH: main
INFRA_COMMIT_HASH: ''
INFRA_IMG: quay.io/openstack-k8s-operators/infra-operator-index:latest
INFRA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/kuttl-test.yaml
INFRA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/test/kuttl/tests
INFRA_KUTTL_NAMESPACE: infra-kuttl-tests
INFRA_REPO: https://github.com/openstack-k8s-operators/infra-operator.git
INSTALL_CERT_MANAGER: false
INSTALL_NMSTATE: true || false
INSTALL_NNCP: true || false
INTERNALAPI_HOST_ROUTES: ''
IPV6_LAB_IPV4_NETWORK_IPADDRESS: 172.30.0.1/24
IPV6_LAB_IPV6_NETWORK_IPADDRESS: fd00:abcd:abcd:fc00::1/64
IPV6_LAB_LIBVIRT_STORAGE_POOL: default
IPV6_LAB_MANAGE_FIREWALLD: 'true'
IPV6_LAB_NAT64_HOST_IPV4: 172.30.0.2/24
IPV6_LAB_NAT64_HOST_IPV6: fd00:abcd:abcd:fc00::2/64
IPV6_LAB_NAT64_INSTANCE_NAME: nat64-router
IPV6_LAB_NAT64_IPV6_NETWORK: fd00:abcd:abcd:fc00::/64
IPV6_LAB_NAT64_TAYGA_DYNAMIC_POOL: 192.168.255.0/24
IPV6_LAB_NAT64_TAYGA_IPV4: 192.168.255.1
IPV6_LAB_NAT64_TAYGA_IPV6: fd00:abcd:abcd:fc00::3
IPV6_LAB_NAT64_TAYGA_IPV6_PREFIX: fd00:abcd:abcd:fcff::/96
IPV6_LAB_NAT64_UPDATE_PACKAGES: 'false'
IPV6_LAB_NETWORK_NAME: nat64
IPV6_LAB_SNO_CLUSTER_NETWORK: fd00:abcd:0::/48
IPV6_LAB_SNO_HOST_IP: fd00:abcd:abcd:fc00::11
IPV6_LAB_SNO_HOST_PREFIX: '64'
IPV6_LAB_SNO_INSTANCE_NAME: sno
IPV6_LAB_SNO_MACHINE_NETWORK: fd00:abcd:abcd:fc00::/64
IPV6_LAB_SNO_OCP_MIRROR_URL: https://mirror.openshift.com/pub/openshift-v4/clients/ocp
IPV6_LAB_SNO_OCP_VERSION: latest-4.14
IPV6_LAB_SNO_SERVICE_NETWORK: fd00:abcd:abcd:fc03::/112
IPV6_LAB_SSH_PUB_KEY: /home/zuul/.ssh/id_rsa.pub
IPV6_LAB_WORK_DIR: /home/zuul/.ipv6lab
IRONIC: config/samples/ironic_v1beta1_ironic.yaml
IRONICAPI_DEPL_IMG: unused
IRONICCON_DEPL_IMG: unused
IRONICINS_DEPL_IMG: unused
IRONICNAG_DEPL_IMG: unused
IRONICPXE_DEPL_IMG: unused
IRONIC_BRANCH: main
IRONIC_COMMIT_HASH: ''
IRONIC_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/config/samples/ironic_v1beta1_ironic.yaml
IRONIC_IMAGE: quay.io/metal3-io/ironic
IRONIC_IMAGE_TAG: release-24.1
IRONIC_IMG: quay.io/openstack-k8s-operators/ironic-operator-index:latest
IRONIC_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/kuttl-test.yaml
IRONIC_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ironic-operator/test/kuttl/tests
IRONIC_KUTTL_NAMESPACE: ironic-kuttl-tests
IRONIC_REPO: https://github.com/openstack-k8s-operators/ironic-operator.git
KEYSTONEAPI: config/samples/keystone_v1beta1_keystoneapi.yaml
KEYSTONEAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/config/samples/keystone_v1beta1_keystoneapi.yaml
KEYSTONEAPI_DEPL_IMG: unused
KEYSTONE_BRANCH: main
KEYSTONE_COMMIT_HASH: ''
KEYSTONE_FEDERATION_CLIENT_SECRET: COX8bmlKAWn56XCGMrKQJj7dgHNAOl6f
KEYSTONE_FEDERATION_CRYPTO_PASSPHRASE: openstack
KEYSTONE_IMG: quay.io/openstack-k8s-operators/keystone-operator-index:latest
KEYSTONE_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/kuttl-test.yaml
KEYSTONE_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/keystone-operator/test/kuttl/tests
KEYSTONE_KUTTL_NAMESPACE: keystone-kuttl-tests
KEYSTONE_REPO: https://github.com/openstack-k8s-operators/keystone-operator.git
KUBEADMIN_PWD: '12345678'
LIBVIRT_SECRET: libvirt-secret
LOKI_DEPLOY_MODE: openshift-network
LOKI_DEPLOY_NAMESPACE: netobserv
LOKI_DEPLOY_SIZE: 1x.demo
LOKI_NAMESPACE: openshift-operators-redhat
LOKI_OPERATOR_GROUP: openshift-operators-redhat-loki
LOKI_SUBSCRIPTION: loki-operator
LVMS_CR: '1'
MANILA: config/samples/manila_v1beta1_manila.yaml
MANILAAPI_DEPL_IMG: unused
MANILASCH_DEPL_IMG: unused
MANILASHARE_DEPL_IMG: unused
MANILA_BRANCH: main
MANILA_COMMIT_HASH: ''
MANILA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/config/samples/manila_v1beta1_manila.yaml
MANILA_IMG: quay.io/openstack-k8s-operators/manila-operator-index:latest
MANILA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/kuttl-test.yaml
MANILA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/manila-operator/test/kuttl/tests
MANILA_KUTTL_NAMESPACE: manila-kuttl-tests
MANILA_REPO: https://github.com/openstack-k8s-operators/manila-operator.git
MANILA_SERVICE_ENABLED: 'true'
MARIADB: config/samples/mariadb_v1beta1_galera.yaml
MARIADB_BRANCH: main
MARIADB_CHAINSAW_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/config.yaml
MARIADB_CHAINSAW_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/chainsaw/tests
MARIADB_CHAINSAW_NAMESPACE: mariadb-chainsaw-tests
MARIADB_COMMIT_HASH: ''
MARIADB_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/config/samples/mariadb_v1beta1_galera.yaml
MARIADB_DEPL_IMG: unused
MARIADB_IMG: quay.io/openstack-k8s-operators/mariadb-operator-index:latest
MARIADB_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/kuttl-test.yaml
MARIADB_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/mariadb-operator/test/kuttl/tests
MARIADB_KUTTL_NAMESPACE: mariadb-kuttl-tests
MARIADB_REPO: https://github.com/openstack-k8s-operators/mariadb-operator.git
MEMCACHED: config/samples/memcached_v1beta1_memcached.yaml
MEMCACHED_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/memcached_v1beta1_memcached.yaml
MEMCACHED_DEPL_IMG: unused
METADATA_SHARED_SECRET: '1234567842'
METALLB_IPV6_POOL: fd00:aaaa::80-fd00:aaaa::90
METALLB_POOL: 192.168.122.80-192.168.122.90
MICROSHIFT: '0'
MIRROR_INSECURE: 'true'
MIRROR_NAMESPACE: openstack-mirror
MIRROR_REGISTRY_HOST: default-route-openshift-image-registry.apps-crc.testing
NAMESPACE: openstack
NETCONFIG: config/samples/network_v1beta1_netconfig.yaml
NETCONFIG_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator/config/samples/network_v1beta1_netconfig.yaml
NETCONFIG_DEPL_IMG: unused
NETOBSERV_DEPLOY_NAMESPACE: netobserv
NETOBSERV_NAMESPACE: openshift-netobserv-operator
NETOBSERV_OPERATOR_GROUP: openshift-netobserv-operator-net
NETOBSERV_SUBSCRIPTION: netobserv-operator
NETWORK_BGP: 'false'
NETWORK_DESIGNATE_ADDRESS_PREFIX: 172.28.0
NETWORK_DESIGNATE_EXT_ADDRESS_PREFIX: 172.50.0
NETWORK_INTERNALAPI_ADDRESS_PREFIX: 172.17.0
NETWORK_ISOLATION: 'true'
NETWORK_ISOLATION_INSTANCE_NAME: crc
NETWORK_ISOLATION_IPV4: 'true'
NETWORK_ISOLATION_IPV4_ADDRESS: 172.16.1.1/24
NETWORK_ISOLATION_IPV4_NAT: 'true'
NETWORK_ISOLATION_IPV6: 'false'
NETWORK_ISOLATION_IPV6_ADDRESS: fd00:aaaa::1/64
NETWORK_ISOLATION_IP_ADDRESS: 192.168.122.10
NETWORK_ISOLATION_MAC: '52:54:00:11:11:10'
NETWORK_ISOLATION_NETWORK_NAME: net-iso
NETWORK_ISOLATION_NET_NAME: default
NETWORK_ISOLATION_USE_DEFAULT_NETWORK: 'true'
NETWORK_MTU: '1500'
NETWORK_STORAGEMGMT_ADDRESS_PREFIX: 172.20.0
NETWORK_STORAGE_ADDRESS_PREFIX: 172.18.0
NETWORK_STORAGE_MACVLAN: ''
NETWORK_TENANT_ADDRESS_PREFIX: 172.19.0
NETWORK_VLAN_START: '20'
NETWORK_VLAN_STEP: '1'
NEUTRONAPI: config/samples/neutron_v1beta1_neutronapi.yaml
NEUTRONAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/config/samples/neutron_v1beta1_neutronapi.yaml
NEUTRONAPI_DEPL_IMG: unused
NEUTRON_BRANCH: main
NEUTRON_COMMIT_HASH: ''
NEUTRON_IMG: quay.io/openstack-k8s-operators/neutron-operator-index:latest
NEUTRON_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/kuttl-test.yaml
NEUTRON_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/neutron-operator/test/kuttl/tests
NEUTRON_KUTTL_NAMESPACE: neutron-kuttl-tests
NEUTRON_REPO: https://github.com/openstack-k8s-operators/neutron-operator.git
NFS_HOME: /home/nfs
NMSTATE_NAMESPACE: openshift-nmstate
NMSTATE_OPERATOR_GROUP: openshift-nmstate-tn6k8
NMSTATE_SUBSCRIPTION: kubernetes-nmstate-operator
NNCP_ADDITIONAL_HOST_ROUTES: ''
NNCP_BGP_1_INTERFACE: enp7s0
NNCP_BGP_1_IP_ADDRESS: 100.65.4.2
NNCP_BGP_2_INTERFACE: enp8s0
NNCP_BGP_2_IP_ADDRESS: 100.64.4.2
NNCP_BRIDGE: ospbr
NNCP_CLEANUP_TIMEOUT: 120s
NNCP_CTLPLANE_IPV6_ADDRESS_PREFIX: 'fd00:aaaa::'
NNCP_CTLPLANE_IPV6_ADDRESS_SUFFIX: '10'
NNCP_CTLPLANE_IP_ADDRESS_PREFIX: 192.168.122
NNCP_CTLPLANE_IP_ADDRESS_SUFFIX: '10'
NNCP_DNS_SERVER: 192.168.122.1
NNCP_DNS_SERVER_IPV6: fd00:aaaa::1
NNCP_GATEWAY: 192.168.122.1
NNCP_GATEWAY_IPV6: fd00:aaaa::1
NNCP_INTERFACE: enp6s0
NNCP_NODES: ''
NNCP_TIMEOUT: 240s
NOVA: config/samples/nova_v1beta1_nova_collapsed_cell.yaml
NOVA_BRANCH: main
NOVA_COMMIT_HASH: ''
NOVA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/nova-operator/config/samples/nova_v1beta1_nova_collapsed_cell.yaml
NOVA_IMG: quay.io/openstack-k8s-operators/nova-operator-index:latest
NOVA_REPO: https://github.com/openstack-k8s-operators/nova-operator.git
NUMBER_OF_INSTANCES: '1'
OCP_NETWORK_NAME: crc
OCTAVIA: config/samples/octavia_v1beta1_octavia.yaml
OCTAVIA_BRANCH: main
OCTAVIA_COMMIT_HASH: ''
OCTAVIA_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/config/samples/octavia_v1beta1_octavia.yaml
OCTAVIA_IMG: quay.io/openstack-k8s-operators/octavia-operator-index:latest
OCTAVIA_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/kuttl-test.yaml
OCTAVIA_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/octavia-operator/test/kuttl/tests
OCTAVIA_KUTTL_NAMESPACE: octavia-kuttl-tests
OCTAVIA_REPO: https://github.com/openstack-k8s-operators/octavia-operator.git
OKD: 'false'
OPENSTACK_BRANCH: main
OPENSTACK_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-bundle:latest
OPENSTACK_COMMIT_HASH: ''
OPENSTACK_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml
OPENSTACK_CRDS_DIR: openstack_crds
OPENSTACK_CTLPLANE: config/samples/core_v1beta1_openstackcontrolplane_galera_network_isolation.yaml
OPENSTACK_IMG: quay.io/openstack-k8s-operators/openstack-operator-index:latest
OPENSTACK_K8S_BRANCH: main
OPENSTACK_K8S_TAG: latest
OPENSTACK_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/kuttl-test.yaml
OPENSTACK_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/openstack-operator/test/kuttl/tests
OPENSTACK_KUTTL_NAMESPACE: openstack-kuttl-tests
OPENSTACK_NEUTRON_CUSTOM_CONF: ''
OPENSTACK_REPO: https://github.com/openstack-k8s-operators/openstack-operator.git
OPENSTACK_STORAGE_BUNDLE_IMG: quay.io/openstack-k8s-operators/openstack-operator-storage-bundle:latest
OPERATOR_BASE_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator
OPERATOR_CHANNEL: ''
OPERATOR_NAMESPACE: openstack-operators
OPERATOR_SOURCE: ''
OPERATOR_SOURCE_NAMESPACE: ''
OUT: /home/zuul/ci-framework-data/artifacts/manifests
OUTPUT_DIR: /home/zuul/ci-framework-data/artifacts/edpm
OVNCONTROLLER: config/samples/ovn_v1beta1_ovncontroller.yaml
OVNCONTROLLER_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovncontroller.yaml
OVNCONTROLLER_NMAP: 'true'
OVNDBS: config/samples/ovn_v1beta1_ovndbcluster.yaml
OVNDBS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovndbcluster.yaml
OVNNORTHD: config/samples/ovn_v1beta1_ovnnorthd.yaml
OVNNORTHD_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/config/samples/ovn_v1beta1_ovnnorthd.yaml
OVN_BRANCH: main
OVN_COMMIT_HASH: ''
OVN_IMG: quay.io/openstack-k8s-operators/ovn-operator-index:latest
OVN_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/kuttl-test.yaml
OVN_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/ovn-operator/test/kuttl/tests
OVN_KUTTL_NAMESPACE: ovn-kuttl-tests
OVN_REPO: https://github.com/openstack-k8s-operators/ovn-operator.git
PASSWORD: '12345678'
PLACEMENTAPI: config/samples/placement_v1beta1_placementapi.yaml
PLACEMENTAPI_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/config/samples/placement_v1beta1_placementapi.yaml
PLACEMENTAPI_DEPL_IMG: unused
PLACEMENT_BRANCH: main
PLACEMENT_COMMIT_HASH: ''
PLACEMENT_IMG: quay.io/openstack-k8s-operators/placement-operator-index:latest
PLACEMENT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/kuttl-test.yaml
PLACEMENT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/placement-operator/test/kuttl/tests
PLACEMENT_KUTTL_NAMESPACE: placement-kuttl-tests
PLACEMENT_REPO: https://github.com/openstack-k8s-operators/placement-operator.git
PULL_SECRET: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/pull-secret.txt
RABBITMQ: docs/examples/default-security-context/rabbitmq.yaml
RABBITMQ_BRANCH: patches
RABBITMQ_COMMIT_HASH: ''
RABBITMQ_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/rabbitmq-operator/docs/examples/default-security-context/rabbitmq.yaml
RABBITMQ_DEPL_IMG: unused
RABBITMQ_IMG: quay.io/openstack-k8s-operators/rabbitmq-cluster-operator-index:latest
RABBITMQ_REPO: https://github.com/openstack-k8s-operators/rabbitmq-cluster-operator.git
REDHAT_OPERATORS: 'false'
REDIS: config/samples/redis_v1beta1_redis.yaml
REDIS_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/infra-operator-redis/config/samples/redis_v1beta1_redis.yaml
REDIS_DEPL_IMG: unused
RH_REGISTRY_PWD: ''
RH_REGISTRY_USER: ''
SECRET: osp-secret
SG_CORE_DEPL_IMG: unused
STANDALONE_COMPUTE_DRIVER: libvirt
STANDALONE_EXTERNAL_NET_PREFFIX: 172.21.0
STANDALONE_INTERNALAPI_NET_PREFIX: 172.17.0
STANDALONE_STORAGEMGMT_NET_PREFIX: 172.20.0
STANDALONE_STORAGE_NET_PREFIX: 172.18.0
STANDALONE_TENANT_NET_PREFIX: 172.19.0
STORAGEMGMT_HOST_ROUTES: ''
STORAGE_CLASS: local-storage
STORAGE_HOST_ROUTES: ''
SWIFT: config/samples/swift_v1beta1_swift.yaml
SWIFT_BRANCH: main
SWIFT_COMMIT_HASH: ''
SWIFT_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/config/samples/swift_v1beta1_swift.yaml
SWIFT_IMG: quay.io/openstack-k8s-operators/swift-operator-index:latest
SWIFT_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/kuttl-test.yaml
SWIFT_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/swift-operator/test/kuttl/tests
SWIFT_KUTTL_NAMESPACE: swift-kuttl-tests
SWIFT_REPO: https://github.com/openstack-k8s-operators/swift-operator.git
TELEMETRY: config/samples/telemetry_v1beta1_telemetry.yaml
TELEMETRY_BRANCH: main
TELEMETRY_COMMIT_HASH: ''
TELEMETRY_CR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/config/samples/telemetry_v1beta1_telemetry.yaml
TELEMETRY_IMG: quay.io/openstack-k8s-operators/telemetry-operator-index:latest
TELEMETRY_KUTTL_BASEDIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator
TELEMETRY_KUTTL_CONF: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/kuttl-test.yaml
TELEMETRY_KUTTL_DIR: /home/zuul/ci-framework-data/artifacts/manifests/operator/telemetry-operator/test/kuttl/suites
TELEMETRY_KUTTL_NAMESPACE: telemetry-kuttl-tests
TELEMETRY_KUTTL_RELPATH: test/kuttl/suites
TELEMETRY_REPO: https://github.com/openstack-k8s-operators/telemetry-operator.git
TENANT_HOST_ROUTES: ''
TIMEOUT: 300s
TLS_ENABLED: 'false'
tripleo_deploy: 'export REGISTRY_PWD:'
2026-02-24 10:20:32,496 p=31993 u=zuul n=ansible | TASK [install_yamls : Generate make targets install_yamls_path={{ cifmw_install_yamls_repo }}, output_directory={{ cifmw_install_yamls_tasks_out }}] ***
2026-02-24 10:20:32,496 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.048) 0:00:54.599 ******
2026-02-24 10:20:32,496 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.048) 0:00:54.598 ******
2026-02-24 10:20:32,860 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:32,878 p=31993 u=zuul n=ansible | TASK [install_yamls : Debug generate_make module var=cifmw_generate_makes] *****
2026-02-24 10:20:32,879 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.382) 0:00:54.982 ******
2026-02-24 10:20:32,879 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.382) 0:00:54.981 ******
2026-02-24 10:20:32,900 p=31993 u=zuul n=ansible | ok: [localhost] =>
cifmw_generate_makes:
changed: false
debug:
/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/Makefile:
- all
- help
- cleanup
- deploy_cleanup
- wait
- crc_storage
- crc_storage_cleanup
- crc_storage_release
- crc_storage_with_retries
- crc_storage_cleanup_with_retries
- operator_namespace
- namespace
- namespace_cleanup
- input
- input_cleanup
- crc_bmo_setup
- crc_bmo_cleanup
- mirror_registry
- mirror_registry_secure
- mirror_registry_ca
- mirror_registry_cleanup
- openstack_prep
- openstack
- openstack_wait
- openstack_init
- openstack_cleanup
- openstack_repo
- openstack_deploy_prep
- openstack_deploy
- openstack_wait_deploy
- openstack_deploy_cleanup
- openstack_update_run
- update_services
- update_system
- openstack_patch_version
- edpm_deploy_generate_keys
- edpm_patch_ansible_runner_image
- edpm_deploy_prep
- edpm_deploy_cleanup
- edpm_deploy
- edpm_deploy_baremetal_prep
- edpm_deploy_baremetal
- edpm_wait_deploy_baremetal
- edpm_wait_deploy
- edpm_register_dns
- edpm_nova_discover_hosts
- openstack_crds
- openstack_crds_cleanup
- edpm_deploy_networker_prep
- edpm_deploy_networker_cleanup
- edpm_deploy_networker
- infra_prep
- infra
- infra_cleanup
- dns_deploy_prep
- dns_deploy
- dns_deploy_cleanup
- netconfig_deploy_prep
- netconfig_deploy
- netconfig_deploy_cleanup
- memcached_deploy_prep
- memcached_deploy
- memcached_deploy_cleanup
- keystone_prep
- keystone
- keystone_cleanup
- keystone_deploy_prep
- keystone_deploy
- keystone_deploy_cleanup
- barbican_prep
- barbican
- barbican_cleanup
- barbican_deploy_prep
- barbican_deploy
- barbican_deploy_validate
- barbican_deploy_cleanup
- mariadb
- mariadb_cleanup
- mariadb_deploy_prep
- mariadb_deploy
- mariadb_deploy_cleanup
- placement_prep
- placement
- placement_cleanup
- placement_deploy_prep
- placement_deploy
- placement_deploy_cleanup
- glance_prep
- glance
- glance_cleanup
- glance_deploy_prep
- glance_deploy
- glance_deploy_cleanup
- ovn_prep
- ovn
- ovn_cleanup
- ovn_deploy_prep
- ovn_deploy
- ovn_deploy_cleanup
- neutron_prep
- neutron
- neutron_cleanup
- neutron_deploy_prep
- neutron_deploy
- neutron_deploy_cleanup
- cinder_prep
- cinder
- cinder_cleanup
- cinder_deploy_prep
- cinder_deploy
- cinder_deploy_cleanup
- rabbitmq_prep
- rabbitmq
- rabbitmq_cleanup
- rabbitmq_deploy_prep
- rabbitmq_deploy
- rabbitmq_deploy_cleanup
- ironic_prep
- ironic
- ironic_cleanup
- ironic_deploy_prep
- ironic_deploy
- ironic_deploy_cleanup
- octavia_prep
- octavia
- octavia_cleanup
- octavia_deploy_prep
- octavia_deploy
- octavia_deploy_cleanup
- designate_prep
- designate
- designate_cleanup
- designate_deploy_prep
- designate_deploy
- designate_deploy_cleanup
- nova_prep
- nova
- nova_cleanup
- nova_deploy_prep
- nova_deploy
- nova_deploy_cleanup
- mariadb_kuttl_run
- mariadb_kuttl
- kuttl_db_prep
- kuttl_db_cleanup
- kuttl_common_prep
- kuttl_common_cleanup
- keystone_kuttl_run
- keystone_kuttl
- barbican_kuttl_run
- barbican_kuttl
- placement_kuttl_run
- placement_kuttl
- cinder_kuttl_run
- cinder_kuttl
- neutron_kuttl_run
- neutron_kuttl
- octavia_kuttl_run
- octavia_kuttl
- designate_kuttl
- designate_kuttl_run
- ovn_kuttl_run
- ovn_kuttl
- infra_kuttl_run
- infra_kuttl
- ironic_kuttl_run
- ironic_kuttl
- ironic_kuttl_crc
- heat_kuttl_run
- heat_kuttl
- heat_kuttl_crc
- glance_kuttl_run
- glance_kuttl
- manila_kuttl_run
- manila_kuttl
- swift_kuttl_run
- swift_kuttl
- horizon_kuttl_run
- horizon_kuttl
- openstack_kuttl_prep
- openstack_kuttl_run
- openstack_kuttl_cleanup
- openstack_kuttl
- mariadb_chainsaw_run
- mariadb_chainsaw
- horizon_prep
- horizon
- horizon_cleanup
- horizon_deploy_prep
- horizon_deploy
- horizon_deploy_cleanup
- heat_prep
- heat
- heat_cleanup
- heat_deploy_prep
- heat_deploy
- heat_deploy_cleanup
- baremetal_prep
- baremetal
- baremetal_cleanup
- ceph_help
- ceph
- ceph_cleanup
- rook_prep
- rook
- rook_deploy_prep
- rook_deploy
- rook_crc_disk
- rook_cleanup
- lvms
- nmstate
- nncp
- nncp_cleanup
- netattach
- netattach_cleanup
- metallb
- metallb_config
- metallb_config_cleanup
- metallb_cleanup
- loki
- loki_cleanup
- loki_deploy
- loki_deploy_cleanup
- netobserv
- netobserv_cleanup
- netobserv_deploy
- netobserv_deploy_cleanup
- manila_prep
- manila
- manila_cleanup
- manila_deploy_prep
- manila_deploy
- manila_deploy_cleanup
- telemetry_prep
- telemetry
- telemetry_cleanup
- telemetry_deploy_prep
- telemetry_deploy
- telemetry_deploy_cleanup
- telemetry_kuttl_run
- telemetry_kuttl
- swift_prep
- swift
- swift_cleanup
- swift_deploy_prep
- swift_deploy
- swift_deploy_cleanup
- certmanager
- certmanager_cleanup
- validate_marketplace
- redis_deploy_prep
- redis_deploy
- redis_deploy_cleanup
- set_slower_etcd_profile
/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/Makefile:
- help
- download_tools
- nfs
- nfs_cleanup
- crc
- crc_cleanup
- crc_scrub
- crc_attach_default_interface
- crc_attach_default_interface_cleanup
- ipv6_lab_network
- ipv6_lab_network_cleanup
- ipv6_lab_nat64_router
- ipv6_lab_nat64_router_cleanup
- ipv6_lab_sno
- ipv6_lab_sno_cleanup
- ipv6_lab
- ipv6_lab_cleanup
- attach_default_interface
- attach_default_interface_cleanup
- network_isolation_bridge
- network_isolation_bridge_cleanup
- edpm_baremetal_compute
- edpm_compute
- edpm_compute_bootc
- edpm_ansible_runner
- edpm_computes_bgp
- edpm_compute_repos
- edpm_compute_cleanup
- edpm_networker
- edpm_networker_cleanup
- edpm_deploy_instance
- tripleo_deploy
- standalone_deploy
- standalone_sync
- standalone
- standalone_cleanup
- standalone_snapshot
- standalone_revert
- cifmw_prepare
- cifmw_cleanup
- bmaas_network
- bmaas_network_cleanup
- bmaas_route_crc_and_crc_bmaas_networks
- bmaas_route_crc_and_crc_bmaas_networks_cleanup
- bmaas_crc_attach_network
- bmaas_crc_attach_network_cleanup
- bmaas_crc_baremetal_bridge
- bmaas_crc_baremetal_bridge_cleanup
- bmaas_baremetal_net_nad
- bmaas_baremetal_net_nad_cleanup
- bmaas_metallb
- bmaas_metallb_cleanup
- bmaas_virtual_bms
- bmaas_virtual_bms_cleanup
- bmaas_sushy_emulator
- bmaas_sushy_emulator_cleanup
- bmaas_sushy_emulator_wait
- bmaas_generate_nodes_yaml
- bmaas
- bmaas_cleanup
failed: false
success: true
2026-02-24 10:20:32,910 p=31993 u=zuul n=ansible | TASK [install_yamls : Create the install_yamls parameters file dest={{ cifmw_basedir }}/artifacts/parameters/install-yamls-params.yml, content={{
{
'cifmw_install_yamls_environment': cifmw_install_yamls_environment,
'cifmw_install_yamls_defaults': cifmw_install_yamls_defaults
} | to_nice_yaml
}}, mode=0644] ***
2026-02-24 10:20:32,910 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.031) 0:00:55.013 ******
2026-02-24 10:20:32,910 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:32 +0000 (0:00:00.030) 0:00:55.012 ******
2026-02-24 10:20:33,259 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:20:33,270 p=31993 u=zuul n=ansible | TASK [install_yamls : Create empty cifmw_install_yamls_environment if needed cifmw_install_yamls_environment={}] ***
2026-02-24 10:20:33,270 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:33 +0000 (0:00:00.359) 0:00:55.373 ******
2026-02-24 10:20:33,270 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:33 +0000 (0:00:00.359) 0:00:55.372 ******
2026-02-24 10:20:33,286 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:33,301 p=31993 u=zuul n=ansible | TASK [discover_latest_image : Get latest image url={{ cifmw_discover_latest_image_base_url }}, image_prefix={{ cifmw_discover_latest_image_qcow_prefix }}, images_file={{ cifmw_discover_latest_image_images_file }}] ***
2026-02-24 10:20:33,301 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:33 +0000 (0:00:00.031) 0:00:55.404 ******
2026-02-24 10:20:33,301 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:33 +0000 (0:00:00.030) 0:00:55.403 ******
2026-02-24 10:20:34,059 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:20:34,074 p=31993 u=zuul n=ansible | TASK [discover_latest_image : Export facts accordingly cifmw_discovered_image_name={{ discovered_image['data']['image_name'] }}, cifmw_discovered_image_url={{ discovered_image['data']['image_url'] }}, cifmw_discovered_hash={{ discovered_image['data']['hash'] }}, cifmw_discovered_hash_algorithm={{ discovered_image['data']['hash_algorithm'] }}, cacheable=True] ***
2026-02-24 10:20:34,074 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:34 +0000 (0:00:00.773) 0:00:56.177 ******
2026-02-24 10:20:34,074 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:34 +0000 (0:00:00.773) 0:00:56.176 ******
2026-02-24 10:20:34,107 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:34,123 p=31993 u=zuul n=ansible | TASK [cifmw_setup : Create artifacts with custom params mode=0644, dest={{ cifmw_basedir }}/artifacts/parameters/custom-params.yml, content={{ ci_framework_params | to_nice_yaml }}] ***
2026-02-24 10:20:34,124 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:34 +0000 (0:00:00.049) 0:00:56.227 ******
2026-02-24 10:20:34,124 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:34 +0000 (0:00:00.049) 0:00:56.226 ******
2026-02-24 10:20:34,848 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:20:34,861 p=31993 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] ***
2026-02-24 10:20:34,861 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:34 +0000 (0:00:00.737) 0:00:56.964 ******
2026-02-24 10:20:34,861 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:34 +0000 (0:00:00.737) 0:00:56.963 ******
2026-02-24 10:20:34,912 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:34,918 p=31993 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] ***
2026-02-24 10:20:34,918 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:34 +0000 (0:00:00.057) 0:00:57.022 ******
2026-02-24 10:20:34,919 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:34 +0000 (0:00:00.057) 0:00:57.020 ******
2026-02-24 10:20:34,991 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:34,999 p=31993 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_infra _raw_params={{ hook.type }}.yml] ***
2026-02-24 10:20:34,999 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:34 +0000 (0:00:00.080) 0:00:57.102 ******
2026-02-24 10:20:34,999 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:34 +0000 (0:00:00.080) 0:00:57.101 ******
2026-02-24 10:20:35,095 p=31993 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Download needed tools', 'inventory': 'localhost,', 'connection': 'local', 'type': 'playbook', 'source': '/home/zuul/src/github.com/openstack-k8s-operators/install_yamls/devsetup/download_tools.yaml'})
2026-02-24 10:20:35,104 p=31993 u=zuul n=ansible | TASK [run_hook : Set playbook path for Download needed tools cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] ***
2026-02-24 10:20:35,104 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.105) 0:00:57.207 ******
2026-02-24 10:20:35,104 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.105) 0:00:57.206 ******
2026-02-24 10:20:35,139 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:35,145 p=31993 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] ***********************
2026-02-24 10:20:35,145 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.041) 0:00:57.248 ******
2026-02-24 10:20:35,145 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.041) 0:00:57.247 ******
2026-02-24 10:20:35,304 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:35,313 p=31993 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] ***
2026-02-24 10:20:35,313 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.167) 0:00:57.416 ******
2026-02-24 10:20:35,313 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.167) 0:00:57.415 ******
2026-02-24 10:20:35,326 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:20:35,333 p=31993 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{
(cifmw_basedir, 'artifacts/parameters') | path_join
}}, file_type=file, patterns=*.yml] ***
2026-02-24 10:20:35,333 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.019) 0:00:57.436 ******
2026-02-24 10:20:35,333 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.019) 0:00:57.435 ******
2026-02-24 10:20:35,482 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:35,491 p=31993 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] ***
2026-02-24 10:20:35,492 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.158) 0:00:57.595 ******
2026-02-24 10:20:35,492 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.158) 0:00:57.593 ******
2026-02-24 10:20:35,515 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:35,522 p=31993 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] ***
2026-02-24 10:20:35,522 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.030) 0:00:57.625 ******
2026-02-24 10:20:35,522 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.030) 0:00:57.624 ******
2026-02-24 10:20:35,708 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:35,722 p=31993 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] ***
2026-02-24 10:20:35,722 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.199) 0:00:57.825 ******
2026-02-24 10:20:35,722 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.199) 0:00:57.824 ******
2026-02-24 10:20:35,877 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:20:35,895 p=31993 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Download needed tools] ***************
2026-02-24 10:20:35,895 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.173) 0:00:57.998 ******
2026-02-24 10:20:35,895 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:20:35 +0000 (0:00:00.173) 0:00:57.997 ******
2026-02-24 10:20:35,942 p=31993 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_000_run_hook_without_retry.log
2026-02-24 10:21:14,445 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:14,452 p=31993 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Download needed tools] ******************
2026-02-24 10:21:14,452 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:38.557) 0:01:36.555 ******
2026-02-24 10:21:14,452 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:38.557) 0:01:36.554 ******
2026-02-24 10:21:14,469 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:14,476 p=31993 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] ***
2026-02-24 10:21:14,476 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.023) 0:01:36.579 ******
2026-02-24 10:21:14,476 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.023) 0:01:36.578 ******
2026-02-24 10:21:14,645 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:14,651 p=31993 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] ***
2026-02-24 10:21:14,651 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.175) 0:01:36.754 ******
2026-02-24 10:21:14,651 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.175) 0:01:36.753 ******
2026-02-24 10:21:14,661 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:14,690 p=31993 u=zuul n=ansible | PLAY [Prepare host virtualization] *********************************************
2026-02-24 10:21:14,706 p=31993 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ***
2026-02-24 10:21:14,706 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.054) 0:01:36.809 ******
2026-02-24 10:21:14,706 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.054) 0:01:36.808 ******
2026-02-24 10:21:14,737 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:14,745 p=31993 u=zuul n=ansible | TASK [Ensure libvirt is present/configured name=libvirt_manager] ***************
2026-02-24 10:21:14,745 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.039) 0:01:36.848 ******
2026-02-24 10:21:14,745 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.039) 0:01:36.847 ******
2026-02-24 10:21:14,759 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:14,765 p=31993 u=zuul n=ansible | TASK [Perpare OpenShift provisioner node name=openshift_provisioner_node] ******
2026-02-24 10:21:14,765 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.019) 0:01:36.868 ******
2026-02-24 10:21:14,765 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.019) 0:01:36.867 ******
2026-02-24 10:21:14,778 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:14,806 p=31993 u=zuul n=ansible | PLAY [Run cifmw_setup infra, build package, container and operators, deploy EDPM] ***
2026-02-24 10:21:14,842 p=31993 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ***
2026-02-24 10:21:14,843 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.077) 0:01:36.946 ******
2026-02-24 10:21:14,843 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.077) 0:01:36.944 ******
2026-02-24 10:21:14,896 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:14,905 p=31993 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Environment Definition file existence path={{ cifmw_networking_mapper_networking_env_def_path }}] ***
2026-02-24 10:21:14,905 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.062) 0:01:37.008 ******
2026-02-24 10:21:14,905 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:14 +0000 (0:00:00.062) 0:01:37.007 ******
2026-02-24 10:21:15,061 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:15,067 p=31993 u=zuul n=ansible | TASK [networking_mapper : Check for Networking Definition file existance that=['_net_env_def_stat.stat.exists'], msg=Ensure that the Networking Environment Definition file exists in {{ cifmw_networking_mapper_networking_env_def_path }}, quiet=True] ***
2026-02-24 10:21:15,067 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.162) 0:01:37.171 ******
2026-02-24 10:21:15,068 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.162) 0:01:37.169 ******
2026-02-24 10:21:15,081 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,087 p=31993 u=zuul n=ansible | TASK [networking_mapper : Load the Networking Definition from file path={{ cifmw_networking_mapper_networking_env_def_path }}] ***
2026-02-24 10:21:15,087 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.019) 0:01:37.190 ******
2026-02-24 10:21:15,087 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.019) 0:01:37.189 ******
2026-02-24 10:21:15,101 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,108 p=31993 u=zuul n=ansible | TASK [networking_mapper : Set cifmw_networking_env_definition is present cifmw_networking_env_definition={{
_net_env_def_slurp['content'] |
b64decode |
from_yaml
}}, cacheable=True] ***
2026-02-24 10:21:15,108 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.020) 0:01:37.211 ******
2026-02-24 10:21:15,108 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.020) 0:01:37.210 ******
2026-02-24 10:21:15,121 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,133 p=31993 u=zuul n=ansible | TASK [Deploy OCP using Hive name=hive] *****************************************
2026-02-24 10:21:15,134 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.025) 0:01:37.237 ******
2026-02-24 10:21:15,134 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.025) 0:01:37.235 ******
2026-02-24 10:21:15,146 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,153 p=31993 u=zuul n=ansible | TASK [Prepare CRC name=rhol_crc] ***********************************************
2026-02-24 10:21:15,153 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.019) 0:01:37.257 ******
2026-02-24 10:21:15,154 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.019) 0:01:37.255 ******
2026-02-24 10:21:15,167 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,173 p=31993 u=zuul n=ansible | TASK [Deploy OpenShift cluster using dev-scripts name=devscripts] **************
2026-02-24 10:21:15,174 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.020) 0:01:37.277 ******
2026-02-24 10:21:15,174 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.020) 0:01:37.275 ******
2026-02-24 10:21:15,186 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,192 p=31993 u=zuul n=ansible | TASK [openshift_login : Ensure output directory exists path={{ cifmw_openshift_login_basedir }}/artifacts, state=directory, mode=0755] ***
2026-02-24 10:21:15,193 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.018) 0:01:37.296 ******
2026-02-24 10:21:15,193 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.018) 0:01:37.294 ******
2026-02-24 10:21:15,336 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:15,342 p=31993 u=zuul n=ansible | TASK [openshift_login : OpenShift login _raw_params=login.yml] *****************
2026-02-24 10:21:15,342 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.149) 0:01:37.445 ******
2026-02-24 10:21:15,342 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.149) 0:01:37.444 ******
2026-02-24 10:21:15,365 p=31993 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/login.yml for localhost
2026-02-24 10:21:15,377 p=31993 u=zuul n=ansible | TASK [openshift_login : Check if the password file is present path={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] ***
2026-02-24 10:21:15,377 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.034) 0:01:37.480 ******
2026-02-24 10:21:15,377 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.034) 0:01:37.479 ******
2026-02-24 10:21:15,391 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,398 p=31993 u=zuul n=ansible | TASK [openshift_login : Fetch user password content src={{ cifmw_openshift_login_password_file | default(cifmw_openshift_password_file) }}] ***
2026-02-24 10:21:15,398 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.021) 0:01:37.501 ******
2026-02-24 10:21:15,398 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.021) 0:01:37.500 ******
2026-02-24 10:21:15,412 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,419 p=31993 u=zuul n=ansible | TASK [openshift_login : Set user password as a fact cifmw_openshift_login_password={{ cifmw_openshift_login_password_file_slurp.content | b64decode }}, cacheable=True] ***
2026-02-24 10:21:15,419 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.020) 0:01:37.522 ******
2026-02-24 10:21:15,419 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.020) 0:01:37.521 ******
2026-02-24 10:21:15,433 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,440 p=31993 u=zuul n=ansible | TASK [openshift_login : Set role variables cifmw_openshift_login_kubeconfig={{
cifmw_openshift_login_kubeconfig |
default(cifmw_openshift_kubeconfig) |
default(
ansible_env.KUBECONFIG if 'KUBECONFIG' in ansible_env else
cifmw_openshift_login_kubeconfig_default_path
) | trim
}}, cifmw_openshift_login_user={{ cifmw_openshift_login_user | default(cifmw_openshift_user) | default(omit) }}, cifmw_openshift_login_password={{ cifmw_openshift_login_password | default(cifmw_openshift_password) | default(omit) }}, cifmw_openshift_login_api={{ cifmw_openshift_login_api | default(cifmw_openshift_api) | default(omit) }}, cifmw_openshift_login_cert_login={{ cifmw_openshift_login_cert_login | default(false)}}, cifmw_openshift_login_provided_token={{ cifmw_openshift_provided_token | default(omit) }}, cacheable=True] ***
2026-02-24 10:21:15,440 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.021) 0:01:37.544 ******
2026-02-24 10:21:15,441 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.021) 0:01:37.542 ******
2026-02-24 10:21:15,465 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:15,471 p=31993 u=zuul n=ansible | TASK [openshift_login : Check if kubeconfig exists path={{ cifmw_openshift_login_kubeconfig }}] ***
2026-02-24 10:21:15,471 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.030) 0:01:37.574 ******
2026-02-24 10:21:15,471 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.030) 0:01:37.573 ******
2026-02-24 10:21:15,604 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:15,614 p=31993 u=zuul n=ansible | TASK [openshift_login : Assert that enough data is provided to log in to OpenShift that=cifmw_openshift_login_kubeconfig_stat.stat.exists or (cifmw_openshift_login_provided_token is defined and cifmw_openshift_login_provided_token != '') or (
(cifmw_openshift_login_user is defined) and
(cifmw_openshift_login_password is defined) and
(cifmw_openshift_login_api is defined)
), msg=If an existing kubeconfig is not provided user/pwd or provided/initial token and API URL must be given] ***
2026-02-24 10:21:15,614 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.142) 0:01:37.717 ******
2026-02-24 10:21:15,614 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.142) 0:01:37.716 ******
2026-02-24 10:21:15,632 p=31993 u=zuul n=ansible | ok: [localhost] =>
changed: false
msg: All assertions passed
2026-02-24 10:21:15,641 p=31993 u=zuul n=ansible | TASK [openshift_login : Fetch kubeconfig content src={{ cifmw_openshift_login_kubeconfig }}] ***
2026-02-24 10:21:15,641 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.026) 0:01:37.744 ******
2026-02-24 10:21:15,641 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.026) 0:01:37.743 ******
2026-02-24 10:21:15,654 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,664 p=31993 u=zuul n=ansible | TASK [openshift_login : Fetch x509 key based users cifmw_openshift_login_key_based_users={{
(
cifmw_openshift_login_kubeconfig_content_b64.content |
b64decode |
from_yaml
). users | default([]) |
selectattr('user.client-certificate-data', 'defined') |
map(attribute="name") |
map("split", "/") |
map("first")
}}, cacheable=True] ***
2026-02-24 10:21:15,664 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.023) 0:01:37.768 ******
2026-02-24 10:21:15,665 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.023) 0:01:37.766 ******
2026-02-24 10:21:15,678 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,688 p=31993 u=zuul n=ansible | TASK [openshift_login : Assign key based user if not provided and available cifmw_openshift_login_user={{
(cifmw_openshift_login_assume_cert_system_user | ternary('system:', '')) +
(cifmw_openshift_login_key_based_users | map('replace', 'system:', '') | unique | first)
}}, cifmw_openshift_login_cert_login=True, cacheable=True] ***
2026-02-24 10:21:15,688 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.023) 0:01:37.791 ******
2026-02-24 10:21:15,688 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.023) 0:01:37.790 ******
2026-02-24 10:21:15,702 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,712 p=31993 u=zuul n=ansible | TASK [openshift_login : Set the retry count cifmw_openshift_login_retries_cnt={{
0 if cifmw_openshift_login_retries_cnt is undefined else
cifmw_openshift_login_retries_cnt|int + 1
}}] ***
2026-02-24 10:21:15,712 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.023) 0:01:37.815 ******
2026-02-24 10:21:15,712 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.023) 0:01:37.814 ******
2026-02-24 10:21:15,730 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:15,739 p=31993 u=zuul n=ansible | TASK [openshift_login : Fetch token _raw_params=try_login.yml] *****************
2026-02-24 10:21:15,739 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.027) 0:01:37.842 ******
2026-02-24 10:21:15,739 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.027) 0:01:37.841 ******
2026-02-24 10:21:15,761 p=31993 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/openshift_login/tasks/try_login.yml for localhost
2026-02-24 10:21:15,775 p=31993 u=zuul n=ansible | TASK [openshift_login : Try get OpenShift access token _raw_params=oc whoami -t] ***
2026-02-24 10:21:15,775 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.035) 0:01:37.878 ******
2026-02-24 10:21:15,775 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.035) 0:01:37.877 ******
2026-02-24 10:21:15,785 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:15,792 p=31993 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift token output_dir={{ cifmw_openshift_login_basedir }}/artifacts, script=oc login {%- if cifmw_openshift_login_provided_token is not defined %} {%- if cifmw_openshift_login_user is defined %} -u {{ cifmw_openshift_login_user }} {%- endif %} {%- if cifmw_openshift_login_password is defined %} -p {{ cifmw_openshift_login_password }} {%- endif %} {% else %} --token={{ cifmw_openshift_login_provided_token }} {%- endif %} {%- if cifmw_openshift_login_skip_tls_verify|bool %} --insecure-skip-tls-verify=true {%- endif %} {%- if cifmw_openshift_login_api is defined %} {{ cifmw_openshift_login_api }} {%- endif %}] ***
2026-02-24 10:21:15,792 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.017) 0:01:37.896 ******
2026-02-24 10:21:15,793 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:15 +0000 (0:00:00.017) 0:01:37.894 ******
2026-02-24 10:21:15,825 p=31993 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_001_fetch_openshift.log
2026-02-24 10:21:16,146 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:16,157 p=31993 u=zuul n=ansible | TASK [openshift_login : Ensure kubeconfig is provided that=cifmw_openshift_login_kubeconfig != ""] ***
2026-02-24 10:21:16,157 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:16 +0000 (0:00:00.364) 0:01:38.261 ******
2026-02-24 10:21:16,158 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:16 +0000 (0:00:00.364) 0:01:38.259 ******
2026-02-24 10:21:16,182 p=31993 u=zuul n=ansible | ok: [localhost] =>
changed: false
msg: All assertions passed
2026-02-24 10:21:16,192 p=31993 u=zuul n=ansible | TASK [openshift_login : Fetch new OpenShift access token _raw_params=oc whoami -t] ***
2026-02-24 10:21:16,192 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:16 +0000 (0:00:00.034) 0:01:38.296 ******
2026-02-24 10:21:16,193 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:16 +0000 (0:00:00.035) 0:01:38.294 ******
2026-02-24 10:21:16,507 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:16,514 p=31993 u=zuul n=ansible | TASK [openshift_login : Set new OpenShift token cifmw_openshift_login_token={{
(not cifmw_openshift_login_new_token_out.skipped | default(false)) |
ternary(cifmw_openshift_login_new_token_out.stdout, cifmw_openshift_login_whoami_out.stdout)
}}, cacheable=True] ***
2026-02-24 10:21:16,514 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:16 +0000 (0:00:00.321) 0:01:38.617 ******
2026-02-24 10:21:16,514 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:16 +0000 (0:00:00.321) 0:01:38.616 ******
2026-02-24 10:21:16,540 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:16,546 p=31993 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift API URL _raw_params=oc whoami --show-server=true] ***
2026-02-24 10:21:16,546 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:16 +0000 (0:00:00.031) 0:01:38.649 ******
2026-02-24 10:21:16,546 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:16 +0000 (0:00:00.031) 0:01:38.648 ******
2026-02-24 10:21:16,804 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:16,811 p=31993 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift kubeconfig context _raw_params=oc whoami -c] ***
2026-02-24 10:21:16,811 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:16 +0000 (0:00:00.264) 0:01:38.914 ******
2026-02-24 10:21:16,811 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:16 +0000 (0:00:00.264) 0:01:38.912 ******
2026-02-24 10:21:17,056 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:17,066 p=31993 u=zuul n=ansible | TASK [openshift_login : Fetch OpenShift current user _raw_params=oc whoami] ****
2026-02-24 10:21:17,066 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:17 +0000 (0:00:00.255) 0:01:39.169 ******
2026-02-24 10:21:17,066 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:17 +0000 (0:00:00.255) 0:01:39.168 ******
2026-02-24 10:21:17,349 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:17,361 p=31993 u=zuul n=ansible | TASK [openshift_login : Set OpenShift user, context and API facts cifmw_openshift_login_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_login_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_login_user={{ _oauth_user }}, cifmw_openshift_kubeconfig={{ cifmw_openshift_login_kubeconfig }}, cifmw_openshift_api={{ cifmw_openshift_login_api_out.stdout }}, cifmw_openshift_context={{ cifmw_openshift_login_context_out.stdout }}, cifmw_openshift_user={{ _oauth_user }}, cifmw_openshift_token={{ cifmw_openshift_login_token | default(omit) }}, cifmw_install_yamls_environment={{ ( cifmw_install_yamls_environment |
combine({'KUBECONFIG': cifmw_openshift_login_kubeconfig})
) if cifmw_install_yamls_environment is defined else omit
}}, cacheable=True] ***
2026-02-24 10:21:17,362 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:17 +0000 (0:00:00.295) 0:01:39.465 ******
2026-02-24 10:21:17,362 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:17 +0000 (0:00:00.295) 0:01:39.463 ******
2026-02-24 10:21:17,398 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:17,408 p=31993 u=zuul n=ansible | TASK [openshift_login : Create the openshift_login parameters file dest={{ cifmw_basedir }}/artifacts/parameters/openshift-login-params.yml, content={{ cifmw_openshift_login_params_content | from_yaml | to_nice_yaml }}, mode=0600] ***
2026-02-24 10:21:17,409 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:17 +0000 (0:00:00.046) 0:01:39.512 ******
2026-02-24 10:21:17,409 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:17 +0000 (0:00:00.046) 0:01:39.510 ******
2026-02-24 10:21:17,820 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:17,835 p=31993 u=zuul n=ansible | TASK [openshift_login : Read the install yamls parameters file path={{ cifmw_basedir }}/artifacts/parameters/install-yamls-params.yml] ***
2026-02-24 10:21:17,835 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:17 +0000 (0:00:00.426) 0:01:39.938 ******
2026-02-24 10:21:17,835 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:17 +0000 (0:00:00.426) 0:01:39.937 ******
2026-02-24 10:21:18,198 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:18,218 p=31993 u=zuul n=ansible | TASK [openshift_login : Append the KUBECONFIG to the install yamls parameters content={{
cifmw_openshift_login_install_yamls_artifacts_slurp['content'] | b64decode | from_yaml |
combine(
{
'cifmw_install_yamls_environment': {
'KUBECONFIG': cifmw_openshift_login_kubeconfig
}
}, recursive=true) | to_nice_yaml
}}, dest={{ cifmw_basedir }}/artifacts/parameters/install-yamls-params.yml, mode=0600] ***
2026-02-24 10:21:18,218 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:18 +0000 (0:00:00.382) 0:01:40.321 ******
2026-02-24 10:21:18,218 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:18 +0000 (0:00:00.382) 0:01:40.320 ******
2026-02-24 10:21:18,844 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:18,862 p=31993 u=zuul n=ansible | TASK [openshift_setup : Ensure output directory exists path={{ cifmw_openshift_setup_basedir }}/artifacts, state=directory, mode=0755] ***
2026-02-24 10:21:18,862 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:18 +0000 (0:00:00.643) 0:01:40.965 ******
2026-02-24 10:21:18,862 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:18 +0000 (0:00:00.643) 0:01:40.964 ******
2026-02-24 10:21:19,019 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:19,028 p=31993 u=zuul n=ansible | TASK [openshift_setup : Fetch namespaces to create cifmw_openshift_setup_namespaces={{
((
([cifmw_install_yamls_defaults['NAMESPACE']] +
([cifmw_install_yamls_defaults['OPERATOR_NAMESPACE']] if 'OPERATOR_NAMESPACE' is in cifmw_install_yamls_defaults else [])
) if cifmw_install_yamls_defaults is defined else []
) + cifmw_openshift_setup_create_namespaces) | unique
}}] ***
2026-02-24 10:21:19,029 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:19 +0000 (0:00:00.166) 0:01:41.132 ******
2026-02-24 10:21:19,029 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:19 +0000 (0:00:00.166) 0:01:41.130 ******
2026-02-24 10:21:19,051 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:19,066 p=31993 u=zuul n=ansible | TASK [openshift_setup : Create required namespaces kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ item }}, kind=Namespace, state=present] ***
2026-02-24 10:21:19,066 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:19 +0000 (0:00:00.037) 0:01:41.169 ******
2026-02-24 10:21:19,066 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:19 +0000 (0:00:00.037) 0:01:41.168 ******
2026-02-24 10:21:20,222 p=31993 u=zuul n=ansible | changed: [localhost] => (item=openstack)
2026-02-24 10:21:20,842 p=31993 u=zuul n=ansible | changed: [localhost] => (item=openstack-operators)
2026-02-24 10:21:20,853 p=31993 u=zuul n=ansible | TASK [openshift_setup : Get internal OpenShift registry route kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, kind=Route, name=default-route, namespace=openshift-image-registry] ***
2026-02-24 10:21:20,853 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:20 +0000 (0:00:01.786) 0:01:42.956 ******
2026-02-24 10:21:20,853 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:20 +0000 (0:00:01.786) 0:01:42.955 ******
2026-02-24 10:21:20,865 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:20,873 p=31993 u=zuul n=ansible | TASK [openshift_setup : Allow anonymous image-pulls in CRC registry for targeted namespaces state=present, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'kind': 'RoleBinding', 'apiVersion': 'rbac.authorization.k8s.io/v1', 'metadata': {'name': 'system:image-puller', 'namespace': '{{ item }}'}, 'subjects': [{'kind': 'User', 'name': 'system:anonymous'}, {'kind': 'User', 'name': 'system:unauthenticated'}], 'roleRef': {'kind': 'ClusterRole', 'name': 'system:image-puller'}}] ***
2026-02-24 10:21:20,873 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:20 +0000 (0:00:00.019) 0:01:42.976 ******
2026-02-24 10:21:20,873 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:20 +0000 (0:00:00.019) 0:01:42.974 ******
2026-02-24 10:21:20,889 p=31993 u=zuul n=ansible | skipping: [localhost] => (item=openstack)
2026-02-24 10:21:20,889 p=31993 u=zuul n=ansible | skipping: [localhost] => (item=openstack-operators)
2026-02-24 10:21:20,890 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:20,897 p=31993 u=zuul n=ansible | TASK [openshift_setup : Wait for the image registry to be ready kind=Deployment, name=image-registry, namespace=openshift-image-registry, kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Available', 'status': 'True'}] ***
2026-02-24 10:21:20,897 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:20 +0000 (0:00:00.024) 0:01:43.000 ******
2026-02-24 10:21:20,897 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:20 +0000 (0:00:00.024) 0:01:42.999 ******
2026-02-24 10:21:20,915 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:20,922 p=31993 u=zuul n=ansible | TASK [openshift_setup : Login into OpenShift internal registry output_dir={{ cifmw_openshift_setup_basedir }}/artifacts, script=podman login -u {{ cifmw_openshift_user }} -p {{ cifmw_openshift_token }} {%- if cifmw_openshift_setup_skip_internal_registry_tls_verify|bool %} --tls-verify=false {%- endif %} {{ cifmw_openshift_setup_registry_default_route.resources[0].spec.host }}] ***
2026-02-24 10:21:20,922 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:20 +0000 (0:00:00.024) 0:01:43.025 ******
2026-02-24 10:21:20,922 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:20 +0000 (0:00:00.024) 0:01:43.024 ******
2026-02-24 10:21:20,981 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:20,987 p=31993 u=zuul n=ansible | TASK [Ensure we have custom CA installed on host role=install_ca] **************
2026-02-24 10:21:20,987 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:20 +0000 (0:00:00.065) 0:01:43.091 ******
2026-02-24 10:21:20,988 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:20 +0000 (0:00:00.065) 0:01:43.089 ******
2026-02-24 10:21:21,004 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:21,011 p=31993 u=zuul n=ansible | TASK [openshift_setup : Update ca bundle _raw_params=update-ca-trust extract] ***
2026-02-24 10:21:21,011 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.023) 0:01:43.114 ******
2026-02-24 10:21:21,011 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.023) 0:01:43.113 ******
2026-02-24 10:21:21,027 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:21,035 p=31993 u=zuul n=ansible | TASK [openshift_setup : Slurp CAs file src={{ cifmw_openshift_setup_ca_bundle_path }}] ***
2026-02-24 10:21:21,035 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.023) 0:01:43.138 ******
2026-02-24 10:21:21,035 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.023) 0:01:43.137 ******
2026-02-24 10:21:21,051 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:21,059 p=31993 u=zuul n=ansible | TASK [openshift_setup : Create config map with registry CAs kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'v1', 'kind': 'ConfigMap', 'metadata': {'namespace': 'openshift-config', 'name': 'registry-cas'}, 'data': '{{ _config_map_data | items2dict }}'}] ***
2026-02-24 10:21:21,059 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.024) 0:01:43.162 ******
2026-02-24 10:21:21,059 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.024) 0:01:43.161 ******
2026-02-24 10:21:21,075 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:21,082 p=31993 u=zuul n=ansible | TASK [openshift_setup : Install Red Hat CA for pulling images from internal registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'additionalTrustedCA': {'name': 'registry-cas'}}}] ***
2026-02-24 10:21:21,083 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.023) 0:01:43.186 ******
2026-02-24 10:21:21,083 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.023) 0:01:43.184 ******
2026-02-24 10:21:21,098 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:21,105 p=31993 u=zuul n=ansible | TASK [openshift_setup : Add insecure registry kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, merge_type=merge, definition={'apiVersion': 'config.openshift.io/v1', 'kind': 'Image', 'metadata': {'name': 'cluster'}, 'spec': {'registrySources': {'insecureRegistries': ['{{ cifmw_update_containers_registry }}'], 'allowedRegistries': '{{ all_registries }}'}}}] ***
2026-02-24 10:21:21,105 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.022) 0:01:43.208 ******
2026-02-24 10:21:21,105 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.022) 0:01:43.207 ******
2026-02-24 10:21:21,120 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:21,128 p=31993 u=zuul n=ansible | TASK [openshift_setup : Create a ICSP with repository digest mirrors kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, definition={'apiVersion': 'operator.openshift.io/v1alpha1', 'kind': 'ImageContentSourcePolicy', 'metadata': {'name': 'registry-digest-mirrors'}, 'spec': {'repositoryDigestMirrors': '{{ cifmw_openshift_setup_digest_mirrors }}'}}] ***
2026-02-24 10:21:21,128 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.022) 0:01:43.231 ******
2026-02-24 10:21:21,128 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.022) 0:01:43.230 ******
2026-02-24 10:21:21,146 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:21,153 p=31993 u=zuul n=ansible | TASK [openshift_setup : Gather network.operator info kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=operator.openshift.io/v1, kind=Network, name=cluster] ***
2026-02-24 10:21:21,153 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.025) 0:01:43.257 ******
2026-02-24 10:21:21,154 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.025) 0:01:43.255 ******
2026-02-24 10:21:21,986 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:21,999 p=31993 u=zuul n=ansible | TASK [openshift_setup : Patch network operator api_version=operator.openshift.io/v1, kubeconfig={{ cifmw_openshift_kubeconfig }}, kind=Network, name=cluster, persist_config=True, patch=[{'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/routingViaHost', 'value': True, 'op': 'replace'}, {'path': '/spec/defaultNetwork/ovnKubernetesConfig/gatewayConfig/ipForwarding', 'value': 'Global', 'op': 'replace'}]] ***
2026-02-24 10:21:21,999 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.845) 0:01:44.102 ******
2026-02-24 10:21:21,999 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:21 +0000 (0:00:00.845) 0:01:44.101 ******
2026-02-24 10:21:22,864 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:22,872 p=31993 u=zuul n=ansible | TASK [openshift_setup : Patch samples registry configuration kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit)}}, api_version=samples.operator.openshift.io/v1, kind=Config, name=cluster, patch=[{'op': 'replace', 'path': '/spec/samplesRegistry', 'value': 'registry.redhat.io'}]] ***
2026-02-24 10:21:22,872 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:22 +0000 (0:00:00.873) 0:01:44.975 ******
2026-02-24 10:21:22,872 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:22 +0000 (0:00:00.873) 0:01:44.974 ******
2026-02-24 10:21:23,529 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:23,537 p=31993 u=zuul n=ansible | TASK [openshift_setup : Delete the pods from openshift-marketplace namespace kind=Pod, state=absent, delete_all=True, kubeconfig={{ cifmw_openshift_kubeconfig }}, namespace=openshift-marketplace] ***
2026-02-24 10:21:23,537 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.664) 0:01:45.640 ******
2026-02-24 10:21:23,537 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.664) 0:01:45.639 ******
2026-02-24 10:21:23,551 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:23,558 p=31993 u=zuul n=ansible | TASK [openshift_setup : Wait for openshift-marketplace pods to be running _raw_params=oc wait pod --all --for=condition=Ready -n openshift-marketplace --timeout=1m] ***
2026-02-24 10:21:23,558 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.021) 0:01:45.661 ******
2026-02-24 10:21:23,558 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.021) 0:01:45.660 ******
2026-02-24 10:21:23,572 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:23,584 p=31993 u=zuul n=ansible | TASK [Deploy Observability operator. name=openshift_obs] ***********************
2026-02-24 10:21:23,584 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.026) 0:01:45.688 ******
2026-02-24 10:21:23,585 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.026) 0:01:45.686 ******
2026-02-24 10:21:23,605 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:23,612 p=31993 u=zuul n=ansible | TASK [Deploy Metal3 BMHs name=deploy_bmh] **************************************
2026-02-24 10:21:23,612 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.027) 0:01:45.715 ******
2026-02-24 10:21:23,612 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.027) 0:01:45.714 ******
2026-02-24 10:21:23,634 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:23,641 p=31993 u=zuul n=ansible | TASK [Install certmanager operator role name=cert_manager] *********************
2026-02-24 10:21:23,641 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.029) 0:01:45.745 ******
2026-02-24 10:21:23,642 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.029) 0:01:45.743 ******
2026-02-24 10:21:23,730 p=31993 u=zuul n=ansible | TASK [cert_manager : Create role needed directories path={{ cifmw_cert_manager_manifests_dir }}, state=directory, mode=0755] ***
2026-02-24 10:21:23,730 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.088) 0:01:45.833 ******
2026-02-24 10:21:23,730 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.088) 0:01:45.832 ******
2026-02-24 10:21:23,933 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:23,940 p=31993 u=zuul n=ansible | TASK [cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name={{ cifmw_cert_manager_operator_namespace }}, kind=Namespace, state=present] ***
2026-02-24 10:21:23,940 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.210) 0:01:46.043 ******
2026-02-24 10:21:23,941 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:23 +0000 (0:00:00.210) 0:01:46.042 ******
2026-02-24 10:21:24,607 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:24,614 p=31993 u=zuul n=ansible | TASK [cert_manager : Install from Release Manifest _raw_params=release_manifest.yml] ***
2026-02-24 10:21:24,614 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:24 +0000 (0:00:00.673) 0:01:46.717 ******
2026-02-24 10:21:24,614 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:24 +0000 (0:00:00.673) 0:01:46.716 ******
2026-02-24 10:21:24,635 p=31993 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/cert_manager/tasks/release_manifest.yml for localhost
2026-02-24 10:21:24,646 p=31993 u=zuul n=ansible | TASK [cert_manager : Download release manifests url={{ cifmw_cert_manager_release_manifest }}, dest={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml, mode=0664] ***
2026-02-24 10:21:24,646 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:24 +0000 (0:00:00.031) 0:01:46.749 ******
2026-02-24 10:21:24,646 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:24 +0000 (0:00:00.031) 0:01:46.748 ******
2026-02-24 10:21:25,256 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:25,267 p=31993 u=zuul n=ansible | TASK [cert_manager : Install cert-manager from release manifest kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, state=present, src={{ cifmw_cert_manager_manifests_dir }}/cert_manager_manifest.yml] ***
2026-02-24 10:21:25,267 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:25 +0000 (0:00:00.621) 0:01:47.370 ******
2026-02-24 10:21:25,267 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:25 +0000 (0:00:00.621) 0:01:47.369 ******
2026-02-24 10:21:28,658 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:28,698 p=31993 u=zuul n=ansible | TASK [cert_manager : Install from OLM Manifest _raw_params=olm_manifest.yml] ***
2026-02-24 10:21:28,698 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:28 +0000 (0:00:03.430) 0:01:50.801 ******
2026-02-24 10:21:28,698 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:28 +0000 (0:00:03.430) 0:01:50.800 ******
2026-02-24 10:21:28,710 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:28,720 p=31993 u=zuul n=ansible | TASK [cert_manager : Check for cert-manager namspeace existance kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, name=cert-manager, kind=Namespace, field_selectors=['status.phase=Active']] ***
2026-02-24 10:21:28,720 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:28 +0000 (0:00:00.021) 0:01:50.823 ******
2026-02-24 10:21:28,720 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:28 +0000 (0:00:00.021) 0:01:50.822 ******
2026-02-24 10:21:29,334 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:29,341 p=31993 u=zuul n=ansible | TASK [cert_manager : Wait for cert-manager pods to be ready kubeconfig={{ cifmw_openshift_kubeconfig }}, api_key={{ cifmw_openshift_token | default(omit)}}, context={{ cifmw_openshift_context | default(omit) }}, namespace=cert-manager, kind=Pod, wait=True, wait_sleep=10, wait_timeout=600, wait_condition={'type': 'Ready', 'status': 'True'}, label_selectors=['app = {{ item }}']] ***
2026-02-24 10:21:29,342 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:29 +0000 (0:00:00.621) 0:01:51.445 ******
2026-02-24 10:21:29,342 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:29 +0000 (0:00:00.621) 0:01:51.443 ******
2026-02-24 10:21:40,021 p=31993 u=zuul n=ansible | ok: [localhost] => (item=cainjector)
2026-02-24 10:21:40,727 p=31993 u=zuul n=ansible | ok: [localhost] => (item=webhook)
2026-02-24 10:21:41,362 p=31993 u=zuul n=ansible | ok: [localhost] => (item=cert-manager)
2026-02-24 10:21:41,382 p=31993 u=zuul n=ansible | TASK [cert_manager : Create $HOME/bin dir path={{ ansible_user_dir }}/bin, state=directory, mode=0755] ***
2026-02-24 10:21:41,382 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:41 +0000 (0:00:12.040) 0:02:03.485 ******
2026-02-24 10:21:41,382 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:41 +0000 (0:00:12.040) 0:02:03.484 ******
2026-02-24 10:21:41,594 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:41,606 p=31993 u=zuul n=ansible | TASK [cert_manager : Install cert-manager cmctl CLI url=https://github.com/cert-manager/cmctl/releases/{{ cifmw_cert_manager_version }}/download/cmctl_{{ _os }}_{{ _arch }}, dest={{ ansible_user_dir }}/bin/cmctl, mode=0755] ***
2026-02-24 10:21:41,606 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:41 +0000 (0:00:00.224) 0:02:03.710 ******
2026-02-24 10:21:41,607 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:41 +0000 (0:00:00.224) 0:02:03.708 ******
2026-02-24 10:21:42,857 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:42,865 p=31993 u=zuul n=ansible | TASK [cert_manager : Verify cert_manager api _raw_params={{ ansible_user_dir }}/bin/cmctl check api --wait=2m] ***
2026-02-24 10:21:42,865 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:42 +0000 (0:00:01.258) 0:02:04.968 ******
2026-02-24 10:21:42,865 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:42 +0000 (0:00:01.258) 0:02:04.967 ******
2026-02-24 10:21:43,222 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:43,249 p=31993 u=zuul n=ansible | TASK [Configure hosts networking using nmstate name=ci_nmstate] ****************
2026-02-24 10:21:43,249 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.383) 0:02:05.352 ******
2026-02-24 10:21:43,249 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.384) 0:02:05.351 ******
2026-02-24 10:21:43,272 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:43,281 p=31993 u=zuul n=ansible | TASK [Configure multus networks name=ci_multus] ********************************
2026-02-24 10:21:43,281 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.032) 0:02:05.385 ******
2026-02-24 10:21:43,282 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.032) 0:02:05.383 ******
2026-02-24 10:21:43,301 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:43,311 p=31993 u=zuul n=ansible | TASK [Deploy Sushy Emulator service pod name=sushy_emulator] *******************
2026-02-24 10:21:43,311 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.029) 0:02:05.414 ******
2026-02-24 10:21:43,311 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.029) 0:02:05.413 ******
2026-02-24 10:21:43,329 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:43,339 p=31993 u=zuul n=ansible | TASK [Setup Libvirt on controller name=libvirt_manager] ************************
2026-02-24 10:21:43,339 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.027) 0:02:05.442 ******
2026-02-24 10:21:43,339 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.027) 0:02:05.441 ******
2026-02-24 10:21:43,357 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:43,364 p=31993 u=zuul n=ansible | TASK [Prepare container package builder name=pkg_build] ************************
2026-02-24 10:21:43,365 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.025) 0:02:05.468 ******
2026-02-24 10:21:43,365 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.025) 0:02:05.466 ******
2026-02-24 10:21:43,388 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:43,397 p=31993 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] ***
2026-02-24 10:21:43,397 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.032) 0:02:05.500 ******
2026-02-24 10:21:43,397 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.032) 0:02:05.499 ******
2026-02-24 10:21:43,460 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:43,470 p=31993 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] ***
2026-02-24 10:21:43,470 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.072) 0:02:05.573 ******
2026-02-24 10:21:43,470 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.072) 0:02:05.572 ******
2026-02-24 10:21:43,558 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:43,568 p=31993 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_infra _raw_params={{ hook.type }}.yml] ***
2026-02-24 10:21:43,568 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.098) 0:02:05.671 ******
2026-02-24 10:21:43,568 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.098) 0:02:05.670 ******
2026-02-24 10:21:43,675 p=31993 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': 'Fetch nodes facts and save them as parameters', 'type': 'playbook', 'inventory': '/home/zuul/ci-framework-data/artifacts/zuul_inventory.yml', 'source': 'fetch_compute_facts.yml'})
2026-02-24 10:21:43,691 p=31993 u=zuul n=ansible | TASK [run_hook : Set playbook path for Fetch nodes facts and save them as parameters cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] ***
2026-02-24 10:21:43,691 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.123) 0:02:05.794 ******
2026-02-24 10:21:43,692 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.123) 0:02:05.793 ******
2026-02-24 10:21:43,730 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:43,743 p=31993 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] ***********************
2026-02-24 10:21:43,743 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.051) 0:02:05.846 ******
2026-02-24 10:21:43,743 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.051) 0:02:05.845 ******
2026-02-24 10:21:43,922 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:43,931 p=31993 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] ***
2026-02-24 10:21:43,931 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.188) 0:02:06.034 ******
2026-02-24 10:21:43,931 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.188) 0:02:06.033 ******
2026-02-24 10:21:43,945 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:43,954 p=31993 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{
(cifmw_basedir, 'artifacts/parameters') | path_join
}}, file_type=file, patterns=*.yml] ***
2026-02-24 10:21:43,954 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.022) 0:02:06.057 ******
2026-02-24 10:21:43,954 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:43 +0000 (0:00:00.022) 0:02:06.056 ******
2026-02-24 10:21:44,114 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:44,125 p=31993 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] ***
2026-02-24 10:21:44,125 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:44 +0000 (0:00:00.170) 0:02:06.228 ******
2026-02-24 10:21:44,125 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:44 +0000 (0:00:00.171) 0:02:06.227 ******
2026-02-24 10:21:44,140 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:44,149 p=31993 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] ***
2026-02-24 10:21:44,149 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:44 +0000 (0:00:00.024) 0:02:06.252 ******
2026-02-24 10:21:44,149 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:44 +0000 (0:00:00.024) 0:02:06.251 ******
2026-02-24 10:21:44,303 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:44,313 p=31993 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] ***
2026-02-24 10:21:44,313 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:44 +0000 (0:00:00.163) 0:02:06.416 ******
2026-02-24 10:21:44,313 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:44 +0000 (0:00:00.163) 0:02:06.415 ******
2026-02-24 10:21:44,469 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:44,484 p=31993 u=zuul n=ansible | TASK [run_hook : Run hook without retry - Fetch nodes facts and save them as parameters] ***
2026-02-24 10:21:44,484 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:44 +0000 (0:00:00.171) 0:02:06.587 ******
2026-02-24 10:21:44,484 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:44 +0000 (0:00:00.171) 0:02:06.586 ******
2026-02-24 10:21:44,531 p=31993 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_002_run_hook_without_retry_fetch.log
2026-02-24 10:21:53,345 p=31993 u=zuul n=ansible | changed: [localhost]
2026-02-24 10:21:53,353 p=31993 u=zuul n=ansible | TASK [run_hook : Run hook with retry - Fetch nodes facts and save them as parameters] ***
2026-02-24 10:21:53,353 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:08.868) 0:02:15.456 ******
2026-02-24 10:21:53,353 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:08.868) 0:02:15.455 ******
2026-02-24 10:21:53,367 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:53,374 p=31993 u=zuul n=ansible | TASK [run_hook : Check if we have a file path={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] ***
2026-02-24 10:21:53,374 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.021) 0:02:15.477 ******
2026-02-24 10:21:53,375 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.021) 0:02:15.476 ******
2026-02-24 10:21:53,564 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:53,574 p=31993 u=zuul n=ansible | TASK [run_hook : Load generated content in main playbook file={{ cifmw_basedir }}/artifacts/{{ step }}_{{ hook_name }}.yml] ***
2026-02-24 10:21:53,574 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.199) 0:02:15.677 ******
2026-02-24 10:21:53,574 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.199) 0:02:15.676 ******
2026-02-24 10:21:53,612 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:53,633 p=31993 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] ***
2026-02-24 10:21:53,633 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.059) 0:02:15.736 ******
2026-02-24 10:21:53,633 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.059) 0:02:15.735 ******
2026-02-24 10:21:53,698 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:53,717 p=31993 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] ***
2026-02-24 10:21:53,717 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.083) 0:02:15.820 ******
2026-02-24 10:21:53,717 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.083) 0:02:15.819 ******
2026-02-24 10:21:53,797 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:53,807 p=31993 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_package_build _raw_params={{ hook.type }}.yml] ***
2026-02-24 10:21:53,807 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.089) 0:02:15.910 ******
2026-02-24 10:21:53,807 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.089) 0:02:15.909 ******
2026-02-24 10:21:53,887 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:53,902 p=31993 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ***
2026-02-24 10:21:53,902 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.094) 0:02:16.005 ******
2026-02-24 10:21:53,902 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:53 +0000 (0:00:00.094) 0:02:16.004 ******
2026-02-24 10:21:53,990 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:54,001 p=31993 u=zuul n=ansible | TASK [pkg_build : Generate volume list build_volumes={% for pkg in cifmw_pkg_build_list -%}
- "{{ pkg.src|default(cifmw_pkg_build_pkg_basedir ~ '/' ~ pkg.name) }}:/root/src/{{ pkg.name }}:z"
- "{{ cifmw_pkg_build_basedir }}/volumes/packages/{{ pkg.name }}:/root/{{ pkg.name }}:z"
- "{{ cifmw_pkg_build_basedir }}/logs/build_{{ pkg.name }}:/root/logs:z"
{% endfor -%}
- "{{ cifmw_pkg_build_basedir }}/volumes/packages/gating_repo:/root/gating_repo:z"
- "{{ cifmw_pkg_build_basedir }}/artifacts/repositories:/root/yum.repos.d:z,ro"
- "{{ cifmw_pkg_build_basedir }}/artifacts/build-packages.yml:/root/playbook.yml:z,ro"
] ***
2026-02-24 10:21:54,001 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.099) 0:02:16.104 ******
2026-02-24 10:21:54,001 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.099) 0:02:16.103 ******
2026-02-24 10:21:54,024 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:54,033 p=31993 u=zuul n=ansible | TASK [pkg_build : Build package using container name={{ pkg.name }}-builder, auto_remove=True, detach=False, privileged=True, log_driver=k8s-file, log_level=info, log_opt={'path': '{{ cifmw_pkg_build_basedir }}/logs/{{ pkg.name }}-builder.log'}, image={{ cifmw_pkg_build_ctx_name }}, volume={{ build_volumes | from_yaml }}, security_opt=['label=disable', 'seccomp=unconfined', 'apparmor=unconfined'], env={'PROJECT': '{{ pkg.name }}'}, command=ansible-playbook -i localhost, -c local playbook.yml] ***
2026-02-24 10:21:54,033 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.031) 0:02:16.136 ******
2026-02-24 10:21:54,033 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.031) 0:02:16.135 ******
2026-02-24 10:21:54,043 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:54,057 p=31993 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] ***
2026-02-24 10:21:54,057 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.024) 0:02:16.160 ******
2026-02-24 10:21:54,057 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.024) 0:02:16.159 ******
2026-02-24 10:21:54,148 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:54,155 p=31993 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] ***
2026-02-24 10:21:54,155 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.097) 0:02:16.258 ******
2026-02-24 10:21:54,155 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.097) 0:02:16.257 ******
2026-02-24 10:21:54,229 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:54,240 p=31993 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_package_build _raw_params={{ hook.type }}.yml] ***
2026-02-24 10:21:54,240 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.085) 0:02:16.343 ******
2026-02-24 10:21:54,240 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.085) 0:02:16.342 ******
2026-02-24 10:21:54,315 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:54,340 p=31993 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] ***
2026-02-24 10:21:54,341 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.100) 0:02:16.444 ******
2026-02-24 10:21:54,341 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.100) 0:02:16.442 ******
2026-02-24 10:21:54,387 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:54,394 p=31993 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] ***
2026-02-24 10:21:54,394 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.053) 0:02:16.497 ******
2026-02-24 10:21:54,394 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.053) 0:02:16.496 ******
2026-02-24 10:21:54,467 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:54,474 p=31993 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_container_build _raw_params={{ hook.type }}.yml] ***
2026-02-24 10:21:54,474 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.080) 0:02:16.577 ******
2026-02-24 10:21:54,475 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.080) 0:02:16.576 ******
2026-02-24 10:21:54,548 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:54,561 p=31993 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ***
2026-02-24 10:21:54,562 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.087) 0:02:16.665 ******
2026-02-24 10:21:54,562 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.087) 0:02:16.663 ******
2026-02-24 10:21:54,603 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:54,614 p=31993 u=zuul n=ansible | TASK [cifmw_setup : Nothing to do yet msg=No support for that step yet] ********
2026-02-24 10:21:54,614 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.052) 0:02:16.717 ******
2026-02-24 10:21:54,614 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.052) 0:02:16.716 ******
2026-02-24 10:21:54,628 p=31993 u=zuul n=ansible | ok: [localhost] =>
msg: No support for that step yet
2026-02-24 10:21:54,638 p=31993 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] ***
2026-02-24 10:21:54,638 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.023) 0:02:16.741 ******
2026-02-24 10:21:54,638 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.023) 0:02:16.740 ******
2026-02-24 10:21:54,684 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:54,693 p=31993 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] ***
2026-02-24 10:21:54,693 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.055) 0:02:16.797 ******
2026-02-24 10:21:54,694 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.055) 0:02:16.795 ******
2026-02-24 10:21:54,769 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:54,787 p=31993 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_container_build _raw_params={{ hook.type }}.yml] ***
2026-02-24 10:21:54,787 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.093) 0:02:16.890 ******
2026-02-24 10:21:54,787 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.093) 0:02:16.889 ******
2026-02-24 10:21:54,863 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:54,903 p=31993 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] ***
2026-02-24 10:21:54,903 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.116) 0:02:17.006 ******
2026-02-24 10:21:54,903 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.116) 0:02:17.005 ******
2026-02-24 10:21:54,949 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:54,958 p=31993 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] ***
2026-02-24 10:21:54,959 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.055) 0:02:17.062 ******
2026-02-24 10:21:54,959 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:54 +0000 (0:00:00.055) 0:02:17.060 ******
2026-02-24 10:21:55,041 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:55,058 p=31993 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_operator_build _raw_params={{ hook.type }}.yml] ***
2026-02-24 10:21:55,058 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.099) 0:02:17.161 ******
2026-02-24 10:21:55,059 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.099) 0:02:17.160 ******
2026-02-24 10:21:55,135 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,163 p=31993 u=zuul n=ansible | TASK [cifmw_setup : Load parameters files dir={{ cifmw_basedir }}/artifacts/parameters] ***
2026-02-24 10:21:55,163 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.104) 0:02:17.266 ******
2026-02-24 10:21:55,163 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.104) 0:02:17.265 ******
2026-02-24 10:21:55,208 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:55,217 p=31993 u=zuul n=ansible | TASK [operator_build : Ensure mandatory directories exist path={{ cifmw_operator_build_basedir }}/{{ item }}, state=directory, mode=0755] ***
2026-02-24 10:21:55,217 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.053) 0:02:17.320 ******
2026-02-24 10:21:55,217 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.053) 0:02:17.319 ******
2026-02-24 10:21:55,255 p=31993 u=zuul n=ansible | skipping: [localhost] => (item=artifacts)
2026-02-24 10:21:55,265 p=31993 u=zuul n=ansible | skipping: [localhost] => (item=logs)
2026-02-24 10:21:55,267 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,282 p=31993 u=zuul n=ansible | TASK [operator_build : Initialize role output cifmw_operator_build_output={{ cifmw_operator_build_output }}, cifmw_operator_build_meta_name={{ cifmw_operator_build_meta_name }}] ***
2026-02-24 10:21:55,282 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.065) 0:02:17.385 ******
2026-02-24 10:21:55,282 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.065) 0:02:17.384 ******
2026-02-24 10:21:55,318 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,327 p=31993 u=zuul n=ansible | TASK [operator_build : Populate operators list with zuul info _raw_params=zuul_info.yml] ***
2026-02-24 10:21:55,327 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.044) 0:02:17.430 ******
2026-02-24 10:21:55,327 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.044) 0:02:17.429 ******
2026-02-24 10:21:55,354 p=31993 u=zuul n=ansible | skipping: [localhost] => (item={'branch': 'main', 'change': '3642', 'change_url': 'https://github.com/openstack-k8s-operators/ci-framework/pull/3642', 'commit_id': '0a0fabf27748a46a654846fbfd4fd509fe7466dc', 'patchset': '0a0fabf27748a46a654846fbfd4fd509fe7466dc', 'project': {'canonical_hostname': 'github.com', 'canonical_name': 'github.com/openstack-k8s-operators/ci-framework', 'name': 'openstack-k8s-operators/ci-framework', 'short_name': 'ci-framework', 'src_dir': 'src/github.com/openstack-k8s-operators/ci-framework'}, 'topic': None})
2026-02-24 10:21:55,355 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,365 p=31993 u=zuul n=ansible | TASK [operator_build : Merge lists of operators operators_list={{ [cifmw_operator_build_operators, zuul_info_operators | default([])] | community.general.lists_mergeby('name') }}] ***
2026-02-24 10:21:55,365 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.038) 0:02:17.468 ******
2026-02-24 10:21:55,365 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.038) 0:02:17.467 ******
2026-02-24 10:21:55,388 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,398 p=31993 u=zuul n=ansible | TASK [operator_build : Get meta_operator src dir from operators_list cifmw_operator_build_meta_src={{ (operators_list | selectattr('name', 'eq', cifmw_operator_build_meta_name) | map(attribute='src') | first ) | default(cifmw_operator_build_meta_src, true) }}] ***
2026-02-24 10:21:55,398 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.032) 0:02:17.501 ******
2026-02-24 10:21:55,398 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.032) 0:02:17.500 ******
2026-02-24 10:21:55,421 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,431 p=31993 u=zuul n=ansible | TASK [operator_build : Adds meta-operator to the list operators_list={{ [operators_list, meta_operator_info] | community.general.lists_mergeby('name') }}] ***
2026-02-24 10:21:55,431 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.033) 0:02:17.534 ******
2026-02-24 10:21:55,431 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.033) 0:02:17.533 ******
2026-02-24 10:21:55,455 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,464 p=31993 u=zuul n=ansible | TASK [operator_build : Clone operator's code when src dir is empty _raw_params=clone.yml] ***
2026-02-24 10:21:55,464 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.033) 0:02:17.568 ******
2026-02-24 10:21:55,465 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.033) 0:02:17.566 ******
2026-02-24 10:21:55,487 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,497 p=31993 u=zuul n=ansible | TASK [operator_build : Building operators _raw_params=build.yml] ***************
2026-02-24 10:21:55,497 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.032) 0:02:17.600 ******
2026-02-24 10:21:55,497 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.032) 0:02:17.599 ******
2026-02-24 10:21:55,521 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,530 p=31993 u=zuul n=ansible | TASK [operator_build : Building meta operator _raw_params=build.yml] ***********
2026-02-24 10:21:55,530 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.033) 0:02:17.633 ******
2026-02-24 10:21:55,531 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.033) 0:02:17.632 ******
2026-02-24 10:21:55,554 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,566 p=31993 u=zuul n=ansible | TASK [operator_build : Gather role output dest={{ cifmw_operator_build_basedir }}/artifacts/custom-operators.yml, content={{ cifmw_operator_build_output | to_nice_yaml }}, mode=0644] ***
2026-02-24 10:21:55,567 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.036) 0:02:17.670 ******
2026-02-24 10:21:55,567 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.036) 0:02:17.668 ******
2026-02-24 10:21:55,595 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,612 p=31993 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] ***
2026-02-24 10:21:55,612 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.045) 0:02:17.715 ******
2026-02-24 10:21:55,612 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.045) 0:02:17.714 ******
2026-02-24 10:21:55,675 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:55,685 p=31993 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] ***
2026-02-24 10:21:55,685 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.073) 0:02:17.789 ******
2026-02-24 10:21:55,686 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.073) 0:02:17.787 ******
2026-02-24 10:21:55,765 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:55,784 p=31993 u=zuul n=ansible | TASK [run_hook : Loop on hooks for post_operator_build _raw_params={{ hook.type }}.yml] ***
2026-02-24 10:21:55,785 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.099) 0:02:17.888 ******
2026-02-24 10:21:55,785 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.099) 0:02:17.887 ******
2026-02-24 10:21:55,866 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:55,902 p=31993 u=zuul n=ansible | TASK [run_hook : Assert parameters are valid quiet=True, that=['_list_hooks is not string', '_list_hooks is not mapping', '_list_hooks is iterable', '(hooks | default([])) is not string', '(hooks | default([])) is not mapping', '(hooks | default([])) is iterable']] ***
2026-02-24 10:21:55,903 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.117) 0:02:18.006 ******
2026-02-24 10:21:55,903 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.117) 0:02:18.004 ******
2026-02-24 10:21:55,950 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:55,960 p=31993 u=zuul n=ansible | TASK [run_hook : Assert single hooks are all mappings quiet=True, that=['_not_mapping_hooks | length == 0'], msg=All single hooks must be a list of mappings or a mapping.] ***
2026-02-24 10:21:55,960 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.057) 0:02:18.063 ******
2026-02-24 10:21:55,960 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:55 +0000 (0:00:00.057) 0:02:18.062 ******
2026-02-24 10:21:56,039 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:56,061 p=31993 u=zuul n=ansible | TASK [run_hook : Loop on hooks for pre_deploy _raw_params={{ hook.type }}.yml] ***
2026-02-24 10:21:56,061 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.101) 0:02:18.164 ******
2026-02-24 10:21:56,061 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.101) 0:02:18.163 ******
2026-02-24 10:21:56,186 p=31993 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '61 Ceph deploy', 'type': 'playbook', 'source': 'ceph-deploy.yml'})
2026-02-24 10:21:56,204 p=31993 u=zuul n=ansible | included: /home/zuul/src/github.com/openstack-k8s-operators/ci-framework/roles/run_hook/tasks/playbook.yml for localhost => (item={'name': '62 Kustomize OpenStack CR with Ceph', 'type': 'playbook', 'source': 'control_plane_ceph_backends.yml'})
2026-02-24 10:21:56,220 p=31993 u=zuul n=ansible | TASK [run_hook : Set playbook path for 61 Ceph deploy cifmw_basedir={{ _bdir }}, hook_name={{ _hook_name }}, playbook_path={{ _play | realpath }}, log_path={{ _bdir }}/logs/{{ step }}_{{ _hook_name }}.log, extra_vars=-e namespace={{ cifmw_openstack_namespace }} {%- if hook.extra_vars is defined and hook.extra_vars|length > 0 -%} {% for key,value in hook.extra_vars.items() -%} {%- if key == 'file' %} -e "@{{ value }}" {%- else %} -e "{{ key }}={{ value }}" {%- endif %} {%- endfor %} {%- endif %}] ***
2026-02-24 10:21:56,220 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.159) 0:02:18.323 ******
2026-02-24 10:21:56,220 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.159) 0:02:18.322 ******
2026-02-24 10:21:56,259 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:56,269 p=31993 u=zuul n=ansible | TASK [run_hook : Get file stat path={{ playbook_path }}] ***********************
2026-02-24 10:21:56,269 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.048) 0:02:18.372 ******
2026-02-24 10:21:56,269 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.048) 0:02:18.371 ******
2026-02-24 10:21:56,452 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:56,463 p=31993 u=zuul n=ansible | TASK [run_hook : Fail if playbook doesn't exist msg=Playbook {{ playbook_path }} doesn't seem to exist.] ***
2026-02-24 10:21:56,463 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.194) 0:02:18.566 ******
2026-02-24 10:21:56,464 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.194) 0:02:18.565 ******
2026-02-24 10:21:56,482 p=31993 u=zuul n=ansible | skipping: [localhost]
2026-02-24 10:21:56,492 p=31993 u=zuul n=ansible | TASK [run_hook : Get parameters files paths={{
(cifmw_basedir, 'artifacts/parameters') | path_join
}}, file_type=file, patterns=*.yml] ***
2026-02-24 10:21:56,492 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.028) 0:02:18.595 ******
2026-02-24 10:21:56,492 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.028) 0:02:18.594 ******
2026-02-24 10:21:56,660 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:56,676 p=31993 u=zuul n=ansible | TASK [run_hook : Add parameters artifacts as extra variables extra_vars={{ extra_vars }} {% for file in cifmw_run_hook_parameters_files.files %} -e "@{{ file.path }}" {%- endfor %}] ***
2026-02-24 10:21:56,676 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.184) 0:02:18.779 ******
2026-02-24 10:21:56,676 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.184) 0:02:18.778 ******
2026-02-24 10:21:56,700 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:56,716 p=31993 u=zuul n=ansible | TASK [run_hook : Ensure log directory exists path={{ log_path | dirname }}, state=directory, mode=0755] ***
2026-02-24 10:21:56,716 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.039) 0:02:18.819 ******
2026-02-24 10:21:56,716 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.039) 0:02:18.818 ******
2026-02-24 10:21:56,887 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:56,898 p=31993 u=zuul n=ansible | TASK [run_hook : Ensure artifacts directory exists path={{ cifmw_basedir }}/artifacts, state=directory, mode=0755] ***
2026-02-24 10:21:56,898 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.182) 0:02:19.001 ******
2026-02-24 10:21:56,898 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:56 +0000 (0:00:00.181) 0:02:19.000 ******
2026-02-24 10:21:57,061 p=31993 u=zuul n=ansible | ok: [localhost]
2026-02-24 10:21:57,071 p=31993 u=zuul n=ansible | TASK [run_hook : Run hook without retry - 61 Ceph deploy] **********************
2026-02-24 10:21:57,071 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:57 +0000 (0:00:00.173) 0:02:19.174 ******
2026-02-24 10:21:57,071 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:21:57 +0000 (0:00:00.173) 0:02:19.173 ******
2026-02-24 10:21:57,113 p=31993 u=zuul n=ansible | Follow script's output here: /home/zuul/ci-framework-data/logs/ci_script_003_run_hook_without_retry_61.log
2026-02-24 10:24:23,856 p=31993 u=zuul n=ansible | fatal: [localhost]: FAILED! =>
censored: 'the output has been hidden due to the fact that ''no_log: true'' was specified
for this result'
changed: true
2026-02-24 10:24:23,857 p=31993 u=zuul n=ansible | NO MORE HOSTS LEFT *************************************************************
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | PLAY RECAP *********************************************************************
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | localhost : ok=134 changed=41 unreachable=0 failed=1 skipped=98 rescued=0 ignored=1
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:24:23 +0000 (0:02:26.786) 0:04:45.961 ******
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | ===============================================================================
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | run_hook : Run hook without retry - 61 Ceph deploy -------------------- 146.79s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | run_hook : Run hook without retry - Download needed tools -------------- 38.56s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | ci_setup : Install needed packages ------------------------------------- 27.55s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | cert_manager : Wait for cert-manager pods to be ready ------------------ 12.04s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | run_hook : Run hook without retry - Fetch nodes facts and save them as parameters --- 8.87s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | repo_setup : Initialize python venv and install requirements ------------ 7.47s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | ci_setup : Install openshift client ------------------------------------- 5.14s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | cert_manager : Install cert-manager from release manifest --------------- 3.43s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | openshift_setup : Create required namespaces ---------------------------- 1.79s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | repo_setup : Get repo-setup repository ---------------------------------- 1.35s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | cert_manager : Install cert-manager cmctl CLI --------------------------- 1.26s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | ci_setup : Manage directories ------------------------------------------- 0.95s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | repo_setup : Make sure git-core package is installed -------------------- 0.95s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | openshift_setup : Patch network operator -------------------------------- 0.87s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | Gathering Facts --------------------------------------------------------- 0.86s
2026-02-24 10:24:23,858 p=31993 u=zuul n=ansible | openshift_setup : Gather network.operator info -------------------------- 0.85s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | repo_setup : Install repo-setup package --------------------------------- 0.83s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | discover_latest_image : Get latest image -------------------------------- 0.77s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | cifmw_setup : Create artifacts with custom params ----------------------- 0.74s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | cert_manager : Create the cifmw_cert_manager_operator_namespace namespace" --- 0.67s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | Tuesday 24 February 2026 10:24:23 +0000 (0:02:26.787) 0:04:45.960 ******
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | ===============================================================================
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | run_hook -------------------------------------------------------------- 199.63s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | ci_setup --------------------------------------------------------------- 34.85s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | cert_manager ----------------------------------------------------------- 19.52s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | repo_setup ------------------------------------------------------------- 15.66s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | openshift_setup --------------------------------------------------------- 4.72s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | openshift_login --------------------------------------------------------- 3.67s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | install_yamls ----------------------------------------------------------- 3.08s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | cifmw_setup ------------------------------------------------------------- 1.78s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | gather_facts ------------------------------------------------------------ 0.86s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | discover_latest_image --------------------------------------------------- 0.82s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | operator_build ---------------------------------------------------------- 0.39s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | install_ca -------------------------------------------------------------- 0.28s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | ansible.builtin.file ---------------------------------------------------- 0.27s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | networking_mapper ------------------------------------------------------- 0.23s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | ansible.builtin.include_tasks ------------------------------------------- 0.06s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | pkg_build --------------------------------------------------------------- 0.06s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | ansible.builtin.include_vars -------------------------------------------- 0.03s
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
2026-02-24 10:24:23,859 p=31993 u=zuul n=ansible | total ----------------------------------------------------------------- 285.93s
home/zuul/zuul-output/logs/ci-framework-data/logs/crc/ 0000755 0001750 0001750 00000000000 15147276521 022110 5 ustar zuul zuul home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/ 0000755 0001750 0001750 00000000000 15147276521 025577 5 ustar zuul zuul home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/ 0000755 0001750 0001750 00000000000 15147276522 026545 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000267 00000000000 011610 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lifecycle-manager_packageserver-d55dfcdfc-cfp92_4d3661f1-4dcc-48a4-9129-7052c5a2d098/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lif0000755 0001750 0001750 00000000000 15147276521 033065 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000305 00000000000 011601 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lifecycle-manager_packageserver-d55dfcdfc-cfp92_4d3661f1-4dcc-48a4-9129-7052c5a2d098/packageserver/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lif0000755 0001750 0001750 00000000000 15147276540 033066 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000312 00000000000 011577 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lifecycle-manager_packageserver-d55dfcdfc-cfp92_4d3661f1-4dcc-48a4-9129-7052c5a2d098/packageserver/0.log home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lif0000644 0001750 0001750 00000252107 15147276521 033076 0 ustar zuul zuul 2026-02-24T10:12:18.647947183+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="Using in-cluster kube client config"
2026-02-24T10:12:18.658393623+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="Defaulting Interval to '12h0m0s'"
2026-02-24T10:12:18.685437890+00:00 stderr F I0224 10:12:18.681625 1 handler.go:286] Adding GroupVersion packages.operators.coreos.com v1 to ResourceManager
2026-02-24T10:12:18.688998379+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="connection established. cluster-version: v1.31.5"
2026-02-24T10:12:18.688998379+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="operator ready"
2026-02-24T10:12:18.688998379+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="starting informers..."
2026-02-24T10:12:18.688998379+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="informers started"
2026-02-24T10:12:18.688998379+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="waiting for caches to sync..."
2026-02-24T10:12:18.793958739+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="starting workers..."
2026-02-24T10:12:18.846986710+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="connecting to source" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:12:18.846986710+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="connecting to source" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:12:18.846986710+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
2026-02-24T10:12:18.870079687+00:00 stderr F time="2026-02-24T10:12:18Z" level=info msg="connecting to source" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:12:18.874476272+00:00 stderr F W0224 10:12:18.874424 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup redhat-marketplace.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:38492->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:18.877087421+00:00 stderr F W0224 10:12:18.877052 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup certified-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:40666->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:18.881951150+00:00 stderr F W0224 10:12:18.881775 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup community-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:53567->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:18.952388555+00:00 stderr F W0224 10:12:18.952335 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup redhat-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:37722->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.031819 1 secure_serving.go:213] Serving securely on [::]:5443
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.031875 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.031882 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.031925 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::apiserver.local.config/certificates/apiserver.crt::apiserver.local.config/certificates/apiserver.key"
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.032020 1 tlsconfig.go:243] "Starting DynamicServingCertificateController"
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.032661 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file"
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.032671 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.032686 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file"
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.032691 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.033194 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.033200 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.033728 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file"
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.033735 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.033747 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file"
2026-02-24T10:12:19.035436535+00:00 stderr F I0224 10:12:19.033751 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
2026-02-24T10:12:19.133810853+00:00 stderr F I0224 10:12:19.133532 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController
2026-02-24T10:12:19.133887295+00:00 stderr F I0224 10:12:19.133860 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
2026-02-24T10:12:19.133984228+00:00 stderr F I0224 10:12:19.133803 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file
2026-02-24T10:12:19.134026060+00:00 stderr F I0224 10:12:19.133836 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController
2026-02-24T10:12:19.162523842+00:00 stderr F I0224 10:12:19.153183 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file
2026-02-24T10:12:19.162523842+00:00 stderr F E0224 10:12:19.153299 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.162523842+00:00 stderr F I0224 10:12:19.133846 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
2026-02-24T10:12:19.162523842+00:00 stderr F E0224 10:12:19.153617 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.162523842+00:00 stderr F E0224 10:12:19.154918 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.162523842+00:00 stderr F E0224 10:12:19.154994 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.172843737+00:00 stderr F E0224 10:12:19.163041 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.172843737+00:00 stderr F E0224 10:12:19.163121 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.172843737+00:00 stderr F E0224 10:12:19.170551 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.172843737+00:00 stderr F E0224 10:12:19.170609 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.184121282+00:00 stderr F E0224 10:12:19.178206 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.184121282+00:00 stderr F E0224 10:12:19.178277 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.184121282+00:00 stderr F E0224 10:12:19.182718 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.184121282+00:00 stderr F E0224 10:12:19.182744 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.203350580+00:00 stderr F E0224 10:12:19.203197 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.203350580+00:00 stderr F E0224 10:12:19.203254 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.206967622+00:00 stderr F E0224 10:12:19.204440 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.206967622+00:00 stderr F E0224 10:12:19.204481 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.215774491+00:00 stderr F E0224 10:12:19.212430 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.215774491+00:00 stderr F E0224 10:12:19.212726 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.215774491+00:00 stderr F E0224 10:12:19.212851 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.215774491+00:00 stderr F E0224 10:12:19.213003 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.215774491+00:00 stderr F E0224 10:12:19.213129 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.246978375+00:00 stderr F E0224 10:12:19.245871 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.247716658+00:00 stderr F E0224 10:12:19.247262 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.247716658+00:00 stderr F E0224 10:12:19.247294 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.257917159+00:00 stderr F E0224 10:12:19.257036 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.257917159+00:00 stderr F E0224 10:12:19.257074 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.257917159+00:00 stderr F E0224 10:12:19.257779 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.257917159+00:00 stderr F E0224 10:12:19.257793 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.258071584+00:00 stderr F E0224 10:12:19.258052 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.259384614+00:00 stderr F E0224 10:12:19.258218 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.259384614+00:00 stderr F E0224 10:12:19.258357 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.266616795+00:00 stderr F E0224 10:12:19.264728 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.280799129+00:00 stderr F E0224 10:12:19.278412 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.280799129+00:00 stderr F E0224 10:12:19.278426 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.280799129+00:00 stderr F E0224 10:12:19.278644 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.280799129+00:00 stderr F E0224 10:12:19.278803 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.280799129+00:00 stderr F E0224 10:12:19.278850 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.280799129+00:00 stderr F E0224 10:12:19.278947 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.312029975+00:00 stderr F E0224 10:12:19.311860 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.312195770+00:00 stderr F E0224 10:12:19.312165 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.312266712+00:00 stderr F E0224 10:12:19.312234 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.312401536+00:00 stderr F E0224 10:12:19.312383 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.312550190+00:00 stderr F E0224 10:12:19.312519 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.314133899+00:00 stderr F E0224 10:12:19.314102 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.331319054+00:00 stderr F E0224 10:12:19.331200 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.331319054+00:00 stderr F E0224 10:12:19.331252 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.343973541+00:00 stderr F E0224 10:12:19.338538 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.343973541+00:00 stderr F E0224 10:12:19.338595 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.403034818+00:00 stderr F E0224 10:12:19.402976 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.403392699+00:00 stderr F E0224 10:12:19.403371 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.403561774+00:00 stderr F E0224 10:12:19.403535 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.403710978+00:00 stderr F E0224 10:12:19.403690 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.403863743+00:00 stderr F E0224 10:12:19.403845 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.493756912+00:00 stderr F E0224 10:12:19.493708 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.493756912+00:00 stderr F E0224 10:12:19.493744 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.511965019+00:00 stderr F E0224 10:12:19.510140 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.511965019+00:00 stderr F E0224 10:12:19.510176 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.578693410+00:00 stderr F E0224 10:12:19.578643 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.579079912+00:00 stderr F E0224 10:12:19.578904 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.579079912+00:00 stderr F E0224 10:12:19.579027 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.583967912+00:00 stderr F E0224 10:12:19.579166 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.583967912+00:00 stderr F E0224 10:12:19.579325 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.816625208+00:00 stderr F E0224 10:12:19.816568 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.817500155+00:00 stderr F E0224 10:12:19.817456 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.832720880+00:00 stderr F E0224 10:12:19.832063 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.832720880+00:00 stderr F E0224 10:12:19.832106 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:19.907360043+00:00 stderr F E0224 10:12:19.907262 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.907663982+00:00 stderr F E0224 10:12:19.907430 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.907663982+00:00 stderr F E0224 10:12:19.907493 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.907663982+00:00 stderr F E0224 10:12:19.907572 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.907681963+00:00 stderr F E0224 10:12:19.907647 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:19.942771846+00:00 stderr F W0224 10:12:19.941581 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup redhat-marketplace.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:50107->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:19.943623412+00:00 stderr F W0224 10:12:19.943598 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup community-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:37362->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:19.948837791+00:00 stderr F W0224 10:12:19.946205 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup certified-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:56577->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:19.977378775+00:00 stderr F W0224 10:12:19.977319 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup redhat-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:48296->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:20.165804527+00:00 stderr F time="2026-02-24T10:12:20Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:12:20.166904971+00:00 stderr F time="2026-02-24T10:12:20Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup certified-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:56577->10.217.4.10:53: read: connection refused\"" source="{certified-operators openshift-marketplace}"
2026-02-24T10:12:20.458489799+00:00 stderr F E0224 10:12:20.458418 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:20.459572092+00:00 stderr F E0224 10:12:20.459544 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:20.474043286+00:00 stderr F E0224 10:12:20.473982 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:20.474102978+00:00 stderr F E0224 10:12:20.474064 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:20.562575733+00:00 stderr F E0224 10:12:20.559286 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:20.562674226+00:00 stderr F E0224 10:12:20.559286 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:20.562794270+00:00 stderr F E0224 10:12:20.559359 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:20.562915214+00:00 stderr F E0224 10:12:20.559496 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:20.563018707+00:00 stderr F E0224 10:12:20.559508 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:20.568326399+00:00 stderr F time="2026-02-24T10:12:20Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:12:20.568326399+00:00 stderr F time="2026-02-24T10:12:20Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup community-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:37362->10.217.4.10:53: read: connection refused\"" source="{community-operators openshift-marketplace}"
2026-02-24T10:12:20.753034569+00:00 stderr F E0224 10:12:20.752975 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:20.753666538+00:00 stderr F E0224 10:12:20.753633 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:20.753827552+00:00 stderr F E0224 10:12:20.753801 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:20.754436592+00:00 stderr F E0224 10:12:20.754406 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:20.754640088+00:00 stderr F E0224 10:12:20.754610 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:21.333792541+00:00 stderr F W0224 10:12:21.333622 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup redhat-marketplace.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:46679->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:21.512354002+00:00 stderr F W0224 10:12:21.511816 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup certified-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:58468->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:21.743179112+00:00 stderr F E0224 10:12:21.740071 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:21.743179112+00:00 stderr F E0224 10:12:21.740821 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:21.762729050+00:00 stderr F E0224 10:12:21.759863 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:21.762729050+00:00 stderr F E0224 10:12:21.761040 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:21.866123443+00:00 stderr F E0224 10:12:21.866071 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:21.874612103+00:00 stderr F E0224 10:12:21.866341 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:21.874612103+00:00 stderr F E0224 10:12:21.866475 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:21.874612103+00:00 stderr F E0224 10:12:21.866585 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:21.874612103+00:00 stderr F E0224 10:12:21.866697 1 authentication.go:73] "Unable to authenticate the request" err="verifying certificate SN=600491258223116196, SKID=, AKID=0A:A7:6C:D5:0E:EC:E0:D2:8A:1E:05:69:B6:6B:D1:11:D7:BC:C0:65 failed: x509: certificate signed by unknown authority"
2026-02-24T10:12:21.920794325+00:00 stderr F W0224 10:12:21.910525 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup redhat-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:54687->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:22.111314092+00:00 stderr F W0224 10:12:22.110627 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup community-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:53935->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:22.167004536+00:00 stderr F time="2026-02-24T10:12:22Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
2026-02-24T10:12:22.167030256+00:00 stderr F time="2026-02-24T10:12:22Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup redhat-marketplace.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:46679->10.217.4.10:53: read: connection refused\"" source="{redhat-marketplace openshift-marketplace}"
2026-02-24T10:12:23.364420549+00:00 stderr F time="2026-02-24T10:12:23Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:12:23.364453610+00:00 stderr F time="2026-02-24T10:12:23Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup redhat-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:54687->10.217.4.10:53: read: connection refused\"" source="{redhat-operators openshift-marketplace}"
2026-02-24T10:12:23.734223530+00:00 stderr F W0224 10:12:23.734161 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup redhat-marketplace.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:36473->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:24.165394777+00:00 stderr F time="2026-02-24T10:12:24Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:12:24.165394777+00:00 stderr F time="2026-02-24T10:12:24Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup certified-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:58468->10.217.4.10:53: read: connection refused\"" source="{certified-operators openshift-marketplace}"
2026-02-24T10:12:24.237173722+00:00 stderr F W0224 10:12:24.237120 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup certified-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:53232->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:24.285499391+00:00 stderr F W0224 10:12:24.285427 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup redhat-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:52488->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:24.303244513+00:00 stderr F E0224 10:12:24.303200 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:24.305148652+00:00 stderr F E0224 10:12:24.305001 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:24.324153813+00:00 stderr F E0224 10:12:24.324119 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:24.324645748+00:00 stderr F E0224 10:12:24.324613 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:25.000787949+00:00 stderr F W0224 10:12:25.000359 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup community-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:42188->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:25.563633593+00:00 stderr F time="2026-02-24T10:12:25Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:12:25.563633593+00:00 stderr F time="2026-02-24T10:12:25Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup community-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:42188->10.217.4.10:53: read: connection refused\"" source="{community-operators openshift-marketplace}"
2026-02-24T10:12:26.170979179+00:00 stderr F time="2026-02-24T10:12:26Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
2026-02-24T10:12:26.170979179+00:00 stderr F time="2026-02-24T10:12:26Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup redhat-marketplace.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:36473->10.217.4.10:53: read: connection refused\"" source="{redhat-marketplace openshift-marketplace}"
2026-02-24T10:12:27.565155051+00:00 stderr F time="2026-02-24T10:12:27Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:12:27.565227013+00:00 stderr F time="2026-02-24T10:12:27Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup redhat-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:52488->10.217.4.10:53: read: connection refused\"" source="{redhat-operators openshift-marketplace}"
2026-02-24T10:12:27.766284973+00:00 stderr F W0224 10:12:27.766228 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup redhat-marketplace.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:58760->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:27.931064232+00:00 stderr F W0224 10:12:27.930976 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup certified-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:54189->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:28.030213424+00:00 stderr F W0224 10:12:28.028821 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp: lookup redhat-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:34363->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:28.164250084+00:00 stderr F time="2026-02-24T10:12:28Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:12:28.164250084+00:00 stderr F time="2026-02-24T10:12:28Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup certified-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:54189->10.217.4.10:53: read: connection refused\"" source="{certified-operators openshift-marketplace}"
2026-02-24T10:12:29.563522161+00:00 stderr F time="2026-02-24T10:12:29Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:12:29.563522161+00:00 stderr F time="2026-02-24T10:12:29Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup community-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:42188->10.217.4.10:53: read: connection refused\"" source="{community-operators openshift-marketplace}"
2026-02-24T10:12:29.695342663+00:00 stderr F W0224 10:12:29.695282 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused"
2026-02-24T10:12:30.163175183+00:00 stderr F time="2026-02-24T10:12:30Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
2026-02-24T10:12:30.163223544+00:00 stderr F time="2026-02-24T10:12:30Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup redhat-marketplace.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:58760->10.217.4.10:53: read: connection refused\"" source="{redhat-marketplace openshift-marketplace}"
2026-02-24T10:12:31.567200174+00:00 stderr F time="2026-02-24T10:12:31Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:12:31.567244905+00:00 stderr F time="2026-02-24T10:12:31Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp: lookup redhat-operators.openshift-marketplace.svc on 10.217.4.10:53: read udp 10.217.0.39:34363->10.217.4.10:53: read: connection refused\"" source="{redhat-operators openshift-marketplace}"
2026-02-24T10:12:33.311502895+00:00 stderr F W0224 10:12:33.311267 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused"
2026-02-24T10:12:33.890267058+00:00 stderr F W0224 10:12:33.889907 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused"
2026-02-24T10:12:35.025675614+00:00 stderr F W0224 10:12:35.025613 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.140:50051: connect: connection refused"
2026-02-24T10:12:36.734606453+00:00 stderr F W0224 10:12:36.734330 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused"
2026-02-24T10:12:44.902738368+00:00 stderr F W0224 10:12:44.902191 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused"
2026-02-24T10:12:45.424219777+00:00 stderr F W0224 10:12:45.424134 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused"
2026-02-24T10:12:45.573274436+00:00 stderr F W0224 10:12:45.573182 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused"
2026-02-24T10:12:45.998748339+00:00 stderr F W0224 10:12:45.998670 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.140:50051: connect: connection refused"
2026-02-24T10:12:59.663305121+00:00 stderr F W0224 10:12:59.663230 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused"
2026-02-24T10:13:00.329961755+00:00 stderr F W0224 10:13:00.329815 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.140:50051: connect: connection refused"
2026-02-24T10:13:03.461356229+00:00 stderr F W0224 10:13:03.461273 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused"
2026-02-24T10:13:03.479472562+00:00 stderr F W0224 10:13:03.479433 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused"
2026-02-24T10:13:25.962946133+00:00 stderr F W0224 10:13:25.962863 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused"
2026-02-24T10:13:29.306755248+00:00 stderr F W0224 10:13:29.306695 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused"
2026-02-24T10:13:34.694907024+00:00 stderr F time="2026-02-24T10:13:34Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
2026-02-24T10:13:35.295841862+00:00 stderr F time="2026-02-24T10:13:35Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:13:35.295841862+00:00 stderr F time="2026-02-24T10:13:35Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}"
2026-02-24T10:13:37.097845492+00:00 stderr F time="2026-02-24T10:13:37Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:13:37.097883963+00:00 stderr F time="2026-02-24T10:13:37Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}"
2026-02-24T10:13:37.299396327+00:00 stderr F time="2026-02-24T10:13:37Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:13:43.295472842+00:00 stderr F time="2026-02-24T10:13:43Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:13:44.295680050+00:00 stderr F time="2026-02-24T10:13:44Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:14:03.233541531+00:00 stderr F E0224 10:14:03.233099 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://10.217.4.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:03.233541531+00:00 stderr F E0224 10:14:03.233500 1 errors.go:77] "Unhandled Error" err="Post \"https://10.217.4.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:04.180634319+00:00 stderr F E0224 10:14:04.180228 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://10.217.4.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:04.180634319+00:00 stderr F E0224 10:14:04.180551 1 errors.go:77] "Unhandled Error" err="Post \"https://10.217.4.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:04.180634319+00:00 stderr F E0224 10:14:04.180239 1 webhook.go:269] Failed to make webhook authorizer request: Post "https://10.217.4.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:04.180634319+00:00 stderr F E0224 10:14:04.180592 1 errors.go:77] "Unhandled Error" err="Post \"https://10.217.4.1:443/apis/authorization.k8s.io/v1/subjectaccessreviews?timeout=10s\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:59.012981049+00:00 stderr F time="2026-02-24T10:14:59Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:14:59.013357330+00:00 stderr F time="2026-02-24T10:14:59Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:14:59.855951077+00:00 stderr F time="2026-02-24T10:14:59Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
2026-02-24T10:14:59.935377039+00:00 stderr F time="2026-02-24T10:14:59Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:15:16.311258653+00:00 stderr F time="2026-02-24T10:15:16Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:15:16.311702954+00:00 stderr F time="2026-02-24T10:15:16Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:15:18.099954791+00:00 stderr F time="2026-02-24T10:15:18Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
2026-02-24T10:15:18.300206829+00:00 stderr F time="2026-02-24T10:15:18Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:16:06.697363518+00:00 stderr F W0224 10:16:06.694167 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused"
2026-02-24T10:16:06.697363518+00:00 stderr F W0224 10:16:06.696467 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused"
2026-02-24T10:16:06.708130153+00:00 stderr F time="2026-02-24T10:16:06Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:16:06.716456461+00:00 stderr F time="2026-02-24T10:16:06Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}"
2026-02-24T10:16:06.735787650+00:00 stderr F time="2026-02-24T10:16:06Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:16:06.735836771+00:00 stderr F time="2026-02-24T10:16:06Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}"
2026-02-24T10:16:06.735923813+00:00 stderr F W0224 10:16:06.735882 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.140:50051: connect: connection refused"
2026-02-24T10:16:06.746229958+00:00 stderr F W0224 10:16:06.746183 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused"
2026-02-24T10:16:07.701100296+00:00 stderr F W0224 10:16:07.700775 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused"
2026-02-24T10:16:07.739276193+00:00 stderr F W0224 10:16:07.739225 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.140:50051: connect: connection refused"
2026-02-24T10:16:07.771194079+00:00 stderr F W0224 10:16:07.771128 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused"
2026-02-24T10:16:08.717159874+00:00 stderr F W0224 10:16:08.717071 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused"
2026-02-24T10:16:08.889993340+00:00 stderr F time="2026-02-24T10:16:08Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
2026-02-24T10:16:08.889993340+00:00 stderr F time="2026-02-24T10:16:08Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.140:50051: connect: connection refused\"" source="{redhat-marketplace openshift-marketplace}"
2026-02-24T10:16:09.054348143+00:00 stderr F W0224 10:16:09.053807 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.140:50051: connect: connection refused"
2026-02-24T10:16:09.078600815+00:00 stderr F W0224 10:16:09.076982 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused"
2026-02-24T10:16:09.086657127+00:00 stderr F time="2026-02-24T10:16:09Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:16:09.086779300+00:00 stderr F time="2026-02-24T10:16:09Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused\"" source="{certified-operators openshift-marketplace}"
2026-02-24T10:16:10.245117750+00:00 stderr F W0224 10:16:10.244824 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused"
2026-02-24T10:16:10.353080003+00:00 stderr F W0224 10:16:10.352930 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused"
2026-02-24T10:16:11.285354895+00:00 stderr F time="2026-02-24T10:16:11Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:16:11.285354895+00:00 stderr F time="2026-02-24T10:16:11Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}"
2026-02-24T10:16:11.295485538+00:00 stderr F W0224 10:16:11.295417 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.140:50051: connect: connection refused"
2026-02-24T10:16:11.368941255+00:00 stderr F W0224 10:16:11.368873 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused"
2026-02-24T10:16:11.482422066+00:00 stderr F time="2026-02-24T10:16:11Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:16:11.482422066+00:00 stderr F time="2026-02-24T10:16:11Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}"
2026-02-24T10:16:12.473088149+00:00 stderr F W0224 10:16:12.473042 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused"
2026-02-24T10:16:13.005935162+00:00 stderr F W0224 10:16:13.003555 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused"
2026-02-24T10:16:15.280537601+00:00 stderr F time="2026-02-24T10:16:15Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:16:15.280585042+00:00 stderr F time="2026-02-24T10:16:15Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused\"" source="{redhat-operators openshift-marketplace}"
2026-02-24T10:16:15.309398893+00:00 stderr F W0224 10:16:15.308254 1 logging.go:55] [core] [Channel #1 SubChannel #3]grpc: addrConn.createTransport failed to connect to {Addr: "certified-operators.openshift-marketplace.svc:50051", ServerName: "certified-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.214:50051: connect: connection refused"
2026-02-24T10:16:15.476537040+00:00 stderr F time="2026-02-24T10:16:15Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:16:15.476571151+00:00 stderr F time="2026-02-24T10:16:15Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}"
2026-02-24T10:16:15.795588582+00:00 stderr F W0224 10:16:15.795323 1 logging.go:55] [core] [Channel #4 SubChannel #6]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-marketplace.openshift-marketplace.svc:50051", ServerName: "redhat-marketplace.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.140:50051: connect: connection refused"
2026-02-24T10:16:16.892950175+00:00 stderr F W0224 10:16:16.890523 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused"
2026-02-24T10:16:17.190284147+00:00 stderr F W0224 10:16:17.189995 1 logging.go:55] [core] [Channel #7 SubChannel #8]grpc: addrConn.createTransport failed to connect to {Addr: "redhat-operators.openshift-marketplace.svc:50051", ServerName: "redhat-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.138:50051: connect: connection refused"
2026-02-24T10:16:22.474457143+00:00 stderr F W0224 10:16:22.474159 1 logging.go:55] [core] [Channel #2 SubChannel #5]grpc: addrConn.createTransport failed to connect to {Addr: "community-operators.openshift-marketplace.svc:50051", ServerName: "community-operators.openshift-marketplace.svc:50051", }. Err: connection error: desc = "transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused"
2026-02-24T10:16:23.275561861+00:00 stderr F time="2026-02-24T10:16:23Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
2026-02-24T10:16:23.481607182+00:00 stderr F time="2026-02-24T10:16:23Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:16:25.282229963+00:00 stderr F time="2026-02-24T10:16:25Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:16:25.477846552+00:00 stderr F time="2026-02-24T10:16:25Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:16:25.477846552+00:00 stderr F time="2026-02-24T10:16:25Z" level=warning msg="error getting bundle stream" action="refresh cache" err="rpc error: code = Unavailable desc = connection error: desc = \"transport: Error while dialing: dial tcp 10.217.5.189:50051: connect: connection refused\"" source="{community-operators openshift-marketplace}"
2026-02-24T10:16:27.275155434+00:00 stderr F time="2026-02-24T10:16:27Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
2026-02-24T10:16:27.475945972+00:00 stderr F time="2026-02-24T10:16:27Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:16:33.919082940+00:00 stderr F time="2026-02-24T10:16:33Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:24:25.849197154+00:00 stderr F time="2026-02-24T10:24:25Z" level=info msg="updating PackageManifest based on CatalogSource changes: {certified-operators openshift-marketplace}" action="sync catalogsource" address="certified-operators.openshift-marketplace.svc:50051" name=certified-operators namespace=openshift-marketplace
2026-02-24T10:25:18.806777214+00:00 stderr F time="2026-02-24T10:25:18Z" level=info msg="updating PackageManifest based on CatalogSource changes: {community-operators openshift-marketplace}" action="sync catalogsource" address="community-operators.openshift-marketplace.svc:50051" name=community-operators namespace=openshift-marketplace
2026-02-24T10:25:22.581258705+00:00 stderr F time="2026-02-24T10:25:22Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-operators openshift-marketplace}" action="sync catalogsource" address="redhat-operators.openshift-marketplace.svc:50051" name=redhat-operators namespace=openshift-marketplace
2026-02-24T10:25:24.978421054+00:00 stderr F time="2026-02-24T10:25:24Z" level=info msg="updating PackageManifest based on CatalogSource changes: {redhat-marketplace openshift-marketplace}" action="sync catalogsource" address="redhat-marketplace.openshift-marketplace.svc:50051" name=redhat-marketplace namespace=openshift-marketplace
././@LongLink 0000644 0000000 0000000 00000000262 00000000000 011603 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-multus_multus-admission-controller-857f4d67dd-mlncn_db31f9f1-19fc-47b3-8570-5428789afce0/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-multus_multu0000755 0001750 0001750 00000000000 15147276521 033241 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000316 00000000000 011603 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-multus_multus-admission-controller-857f4d67dd-mlncn_db31f9f1-19fc-47b3-8570-5428789afce0/multus-admission-controller/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-multus_multu0000755 0001750 0001750 00000000000 15147276540 033242 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000323 00000000000 011601 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-multus_multus-admission-controller-857f4d67dd-mlncn_db31f9f1-19fc-47b3-8570-5428789afce0/multus-admission-controller/0.log home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-multus_multu0000644 0001750 0001750 00000002374 15147276521 033251 0 ustar zuul zuul 2026-02-24T10:12:16.963338258+00:00 stderr F I0224 10:12:16.961669 1 main.go:57] starting net-attach-def-admission-controller webhook server
2026-02-24T10:12:16.970013383+00:00 stderr F W0224 10:12:16.969949 1 client_config.go:618] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.
2026-02-24T10:12:17.054044213+00:00 stderr F W0224 10:12:17.050436 1 client_config.go:618] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work.
2026-02-24T10:12:17.054044213+00:00 stderr F I0224 10:12:17.052901 1 localmetrics.go:51] UPdating net-attach-def metrics for any with value 0
2026-02-24T10:12:17.054044213+00:00 stderr F I0224 10:12:17.052928 1 localmetrics.go:51] UPdating net-attach-def metrics for sriov with value 0
2026-02-24T10:12:17.054044213+00:00 stderr F I0224 10:12:17.052934 1 localmetrics.go:51] UPdating net-attach-def metrics for ib-sriov with value 0
2026-02-24T10:12:17.054207068+00:00 stderr F I0224 10:12:17.054181 1 controller.go:202] Starting net-attach-def-admission-controller
2026-02-24T10:12:17.157122266+00:00 stderr F I0224 10:12:17.154975 1 controller.go:211] net-attach-def-admission-controller synced and ready
././@LongLink 0000644 0000000 0000000 00000000302 00000000000 011576 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-multus_multus-admission-controller-857f4d67dd-mlncn_db31f9f1-19fc-47b3-8570-5428789afce0/kube-rbac-proxy/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-multus_multu0000755 0001750 0001750 00000000000 15147276540 033242 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000307 00000000000 011603 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-multus_multus-admission-controller-857f4d67dd-mlncn_db31f9f1-19fc-47b3-8570-5428789afce0/kube-rbac-proxy/0.log home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-multus_multu0000644 0001750 0001750 00000002020 15147276521 033235 0 ustar zuul zuul 2026-02-24T10:12:17.101965528+00:00 stderr F W0224 10:12:17.087373 1 deprecated.go:66]
2026-02-24T10:12:17.101965528+00:00 stderr F ==== Removed Flag Warning ======================
2026-02-24T10:12:17.101965528+00:00 stderr F
2026-02-24T10:12:17.101965528+00:00 stderr F logtostderr is removed in the k8s upstream and has no effect any more.
2026-02-24T10:12:17.101965528+00:00 stderr F
2026-02-24T10:12:17.101965528+00:00 stderr F ===============================================
2026-02-24T10:12:17.101965528+00:00 stderr F
2026-02-24T10:12:17.102984390+00:00 stderr F I0224 10:12:17.102395 1 kube-rbac-proxy.go:233] Valid token audiences:
2026-02-24T10:12:17.103549696+00:00 stderr F I0224 10:12:17.103523 1 kube-rbac-proxy.go:347] Reading certificate files
2026-02-24T10:12:17.103842995+00:00 stderr F I0224 10:12:17.103817 1 kube-rbac-proxy.go:395] Starting TCP socket on :8443
2026-02-24T10:12:17.104520286+00:00 stderr F I0224 10:12:17.104270 1 kube-rbac-proxy.go:402] Listening securely on :8443
././@LongLink 0000644 0000000 0000000 00000000226 00000000000 011603 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-dns_node-resolver-qtqms_c43e3252-1b22-48a0-8895-ad98fc88b7cf/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-dns_node-res0000755 0001750 0001750 00000000000 15147276521 033042 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000250 00000000000 011600 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-dns_node-resolver-qtqms_c43e3252-1b22-48a0-8895-ad98fc88b7cf/dns-node-resolver/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-dns_node-res0000755 0001750 0001750 00000000000 15147276541 033044 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000255 00000000000 011605 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-dns_node-resolver-qtqms_c43e3252-1b22-48a0-8895-ad98fc88b7cf/dns-node-resolver/0.log home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-dns_node-res0000644 0001750 0001750 00000000140 15147276521 033037 0 ustar zuul zuul 2026-02-24T10:12:31.538937660+00:00 stdout F /etc/hosts.tmp /etc/hosts differ: char 159, line 3
././@LongLink 0000644 0000000 0000000 00000000277 00000000000 011611 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-authentication-operator_authentication-operator-69f744f599-bl6z5_efdfb8c2-12c0-4134-a05d-f7c880e70649/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-authenticati0000755 0001750 0001750 00000000000 15147276521 033144 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000327 00000000000 011605 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-authentication-operator_authentication-operator-69f744f599-bl6z5_efdfb8c2-12c0-4134-a05d-f7c880e70649/authentication-operator/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-authenticati0000755 0001750 0001750 00000000000 15147276542 033147 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000334 00000000000 011603 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-authentication-operator_authentication-operator-69f744f599-bl6z5_efdfb8c2-12c0-4134-a05d-f7c880e70649/authentication-operator/0.log home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-authenticati0000644 0001750 0001750 00002016271 15147276521 033157 0 ustar zuul zuul 2026-02-24T10:12:11.816955054+00:00 stdout F Copying system trust bundle
2026-02-24T10:12:12.680632719+00:00 stderr F W0224 10:12:12.676401 1 cmd.go:167] Unable to read initial content of "/tmp/terminate": open /tmp/terminate: no such file or directory
2026-02-24T10:12:12.680632719+00:00 stderr F I0224 10:12:12.678270 1 observer_polling.go:159] Starting file observer
2026-02-24T10:12:12.680632719+00:00 stderr F I0224 10:12:12.678785 1 cmd.go:253] Using service-serving-cert provided certificates
2026-02-24T10:12:12.680632719+00:00 stderr F I0224 10:12:12.679562 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}.
2026-02-24T10:12:12.680940609+00:00 stderr F I0224 10:12:12.680854 1 observer_polling.go:159] Starting file observer
2026-02-24T10:12:12.767311060+00:00 stderr F I0224 10:12:12.767264 1 builder.go:304] cluster-authentication-operator version v4.18.0-202501230001.p0.ge8c7c47.assembly.stream.el9-0-gc0e0fa6-
2026-02-24T10:12:12.769027223+00:00 stderr F I0224 10:12:12.768971 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key"
2026-02-24T10:12:13.317168318+00:00 stderr F I0224 10:12:13.315879 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController
2026-02-24T10:12:13.322431680+00:00 stderr F I0224 10:12:13.322379 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400
2026-02-24T10:12:13.322431680+00:00 stderr F I0224 10:12:13.322402 1 maxinflight.go:145] "Initialized mutatingChan" len=200
2026-02-24T10:12:13.322431680+00:00 stderr F I0224 10:12:13.322424 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400
2026-02-24T10:12:13.322456600+00:00 stderr F I0224 10:12:13.322429 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200
2026-02-24T10:12:13.338181791+00:00 stderr F I0224 10:12:13.338133 1 secure_serving.go:57] Forcing use of http/1.1 only
2026-02-24T10:12:13.338181791+00:00 stderr F W0224 10:12:13.338168 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected.
2026-02-24T10:12:13.338181791+00:00 stderr F W0224 10:12:13.338175 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected.
2026-02-24T10:12:13.338207712+00:00 stderr F W0224 10:12:13.338179 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected.
2026-02-24T10:12:13.338207712+00:00 stderr F W0224 10:12:13.338183 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected.
2026-02-24T10:12:13.338207712+00:00 stderr F W0224 10:12:13.338189 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected.
2026-02-24T10:12:13.338207712+00:00 stderr F W0224 10:12:13.338192 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected.
2026-02-24T10:12:13.338741178+00:00 stderr F I0224 10:12:13.338429 1 genericapiserver.go:533] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete
2026-02-24T10:12:13.338802420+00:00 stderr F I0224 10:12:13.338752 1 builder.go:446] detected SingleReplicaTopologyMode, the original leader election has been altered for the default SingleReplicaTopology
2026-02-24T10:12:13.339888293+00:00 stderr F I0224 10:12:13.339389 1 leaderelection.go:254] attempting to acquire leader lease openshift-authentication-operator/cluster-authentication-operator-lock...
2026-02-24T10:12:13.348384433+00:00 stderr F I0224 10:12:13.348338 1 requestheader_controller.go:172] Starting RequestHeaderAuthRequestController
2026-02-24T10:12:13.348502496+00:00 stderr F I0224 10:12:13.348446 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file"
2026-02-24T10:12:13.348835837+00:00 stderr F I0224 10:12:13.348748 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1740288168\" (2025-02-23 05:22:51 +0000 UTC to 2027-02-23 05:22:52 +0000 UTC (now=2026-02-24 10:12:13.34863784 +0000 UTC))"
2026-02-24T10:12:13.348847078+00:00 stderr F I0224 10:12:13.348835 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file"
2026-02-24T10:12:13.348881479+00:00 stderr F I0224 10:12:13.348862 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771927933\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771927933\" (2026-02-24 09:12:12 +0000 UTC to 2027-02-24 09:12:12 +0000 UTC (now=2026-02-24 10:12:13.348840807 +0000 UTC))"
2026-02-24T10:12:13.348946191+00:00 stderr F I0224 10:12:13.348888 1 secure_serving.go:213] Serving securely on [::]:8443
2026-02-24T10:12:13.348958521+00:00 stderr F I0224 10:12:13.348947 1 genericapiserver.go:683] [graceful-termination] waiting for shutdown to be initiated
2026-02-24T10:12:13.348981942+00:00 stderr F I0224 10:12:13.348965 1 tlsconfig.go:243] "Starting DynamicServingCertificateController"
2026-02-24T10:12:13.349072184+00:00 stderr F I0224 10:12:13.349026 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key"
2026-02-24T10:12:13.350877929+00:00 stderr F I0224 10:12:13.350853 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
2026-02-24T10:12:13.350942851+00:00 stderr F I0224 10:12:13.350900 1 shared_informer.go:313] Waiting for caches to sync for client-ca::kube-system::extension-apiserver-authentication::client-ca-file
2026-02-24T10:12:13.351028304+00:00 stderr F I0224 10:12:13.351007 1 shared_informer.go:313] Waiting for caches to sync for RequestHeaderAuthRequestController
2026-02-24T10:12:13.351539850+00:00 stderr F I0224 10:12:13.351492 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false
2026-02-24T10:12:13.351539850+00:00 stderr F I0224 10:12:13.351524 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false
2026-02-24T10:12:13.356445640+00:00 stderr F I0224 10:12:13.356406 1 leaderelection.go:268] successfully acquired lease openshift-authentication-operator/cluster-authentication-operator-lock
2026-02-24T10:12:13.357470631+00:00 stderr F I0224 10:12:13.357349 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175
2026-02-24T10:12:13.357862663+00:00 stderr F I0224 10:12:13.357830 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209
2026-02-24T10:12:13.362263577+00:00 stderr F I0224 10:12:13.359486 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209
2026-02-24T10:12:13.362263577+00:00 stderr F I0224 10:12:13.359991 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"openshift-authentication-operator", Name:"cluster-authentication-operator-lock", UID:"839fdd59-d52f-4e36-823e-d8402daff4a5", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"27616", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' authentication-operator-69f744f599-bl6z5_bef0dfa2-da01-4b5f-9297-1ee96829c848 became leader
2026-02-24T10:12:13.452084534+00:00 stderr F I0224 10:12:13.452027 1 shared_informer.go:320] Caches are synced for RequestHeaderAuthRequestController
2026-02-24T10:12:13.454963602+00:00 stderr F I0224 10:12:13.453960 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file
2026-02-24T10:12:13.454963602+00:00 stderr F E0224 10:12:13.454087 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.454963602+00:00 stderr F I0224 10:12:13.454340 1 shared_informer.go:320] Caches are synced for client-ca::kube-system::extension-apiserver-authentication::client-ca-file
2026-02-24T10:12:13.454963602+00:00 stderr F I0224 10:12:13.454693 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-02-23 05:08:32 +0000 UTC to 2035-02-21 05:08:32 +0000 UTC (now=2026-02-24 10:12:13.454663053 +0000 UTC))"
2026-02-24T10:12:13.454963602+00:00 stderr F I0224 10:12:13.454712 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-02-23 05:08:33 +0000 UTC to 2035-02-21 05:08:33 +0000 UTC (now=2026-02-24 10:12:13.454703325 +0000 UTC))"
2026-02-24T10:12:13.454963602+00:00 stderr F I0224 10:12:13.454753 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1740376476\" [] issuer=\"openshift-kube-controller-manager-operator_csr-signer-signer@1740376476\" (2025-02-24 05:54:36 +0000 UTC to 2027-02-24 05:54:36 +0000 UTC (now=2026-02-24 10:12:13.454716465 +0000 UTC))"
2026-02-24T10:12:13.454963602+00:00 stderr F I0224 10:12:13.454773 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-controller-manager-operator_csr-signer-signer@1740376476\" [] issuer=\"\" (2025-02-24 05:54:35 +0000 UTC to 2027-02-24 05:54:36 +0000 UTC (now=2026-02-24 10:12:13.454760226 +0000 UTC))"
2026-02-24T10:12:13.454963602+00:00 stderr F I0224 10:12:13.454800 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_kube-apiserver-to-kubelet-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:13.454789367 +0000 UTC))"
2026-02-24T10:12:13.454963602+00:00 stderr F I0224 10:12:13.454812 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_kube-control-plane-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2028-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:13.454804658 +0000 UTC))"
2026-02-24T10:12:13.454963602+00:00 stderr F I0224 10:12:13.454826 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:13.454816408 +0000 UTC))"
2026-02-24T10:12:13.455118418+00:00 stderr F I0224 10:12:13.455009 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1740288168\" (2025-02-23 05:22:51 +0000 UTC to 2027-02-23 05:22:52 +0000 UTC (now=2026-02-24 10:12:13.454995763 +0000 UTC))"
2026-02-24T10:12:13.455141469+00:00 stderr F I0224 10:12:13.455125 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771927933\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771927933\" (2026-02-24 09:12:12 +0000 UTC to 2027-02-24 09:12:12 +0000 UTC (now=2026-02-24 10:12:13.455112328 +0000 UTC))"
2026-02-24T10:12:13.455264882+00:00 stderr F E0224 10:12:13.455238 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.468288420+00:00 stderr F E0224 10:12:13.468171 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.470102836+00:00 stderr F E0224 10:12:13.469240 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.480953868+00:00 stderr F E0224 10:12:13.480875 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.483341861+00:00 stderr F E0224 10:12:13.482348 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.503169387+00:00 stderr F E0224 10:12:13.503119 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.506828289+00:00 stderr F E0224 10:12:13.506802 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.560644935+00:00 stderr F E0224 10:12:13.560294 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.562454170+00:00 stderr F E0224 10:12:13.562057 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.604126345+00:00 stderr F I0224 10:12:13.603756 1 base_controller.go:76] Waiting for caches to sync for openshift-oauth-apiserver-EncryptionPrune
2026-02-24T10:12:13.605615321+00:00 stderr F I0224 10:12:13.605581 1 base_controller.go:76] Waiting for caches to sync for openshift-oauth-apiserver-EncryptionKey
2026-02-24T10:12:13.605848808+00:00 stderr F I0224 10:12:13.605828 1 base_controller.go:76] Waiting for caches to sync for OAuthServerRouteEndpointAccessibleController
2026-02-24T10:12:13.605893859+00:00 stderr F I0224 10:12:13.605868 1 base_controller.go:76] Waiting for caches to sync for OAuthServerServiceEndpointsEndpointAccessibleController
2026-02-24T10:12:13.605945010+00:00 stderr F I0224 10:12:13.605906 1 base_controller.go:76] Waiting for caches to sync for openshift-authentication-IngressNodesAvailable
2026-02-24T10:12:13.605945010+00:00 stderr F I0224 10:12:13.605931 1 base_controller.go:76] Waiting for caches to sync for ProxyConfigController
2026-02-24T10:12:13.605956931+00:00 stderr F I0224 10:12:13.605944 1 base_controller.go:76] Waiting for caches to sync for CustomRouteController
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606422 1 base_controller.go:76] Waiting for caches to sync for TrustDistributionController
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606444 1 base_controller.go:76] Waiting for caches to sync for openshift-authentication-RemoveStaleConditions
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606457 1 base_controller.go:76] Waiting for caches to sync for openshift-authentication-IngressState
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606479 1 base_controller.go:76] Waiting for caches to sync for ConfigObserver
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606495 1 base_controller.go:76] Waiting for caches to sync for OpenShiftAuthenticatorCertRequester
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606511 1 base_controller.go:76] Waiting for caches to sync for WebhookAuthenticatorController
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606523 1 base_controller.go:76] Waiting for caches to sync for WebhookAuthenticatorCertApprover_OpenShiftAuthenticator
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606534 1 base_controller.go:76] Waiting for caches to sync for auditPolicyController
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606544 1 base_controller.go:76] Waiting for caches to sync for openshift-oauth-apiserver-EncryptionState
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606552 1 base_controller.go:76] Waiting for caches to sync for openshift-oauth-apiserver-EncryptionMigration
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606562 1 base_controller.go:76] Waiting for caches to sync for NamespaceFinalizerController_openshift-oauth-apiserver
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606572 1 base_controller.go:76] Waiting for caches to sync for SecretRevisionPruneController
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606581 1 base_controller.go:76] Waiting for caches to sync for RevisionController
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606694 1 base_controller.go:76] Waiting for caches to sync for APIServerStaticResources-StaticResources
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.606703 1 base_controller.go:76] Waiting for caches to sync for OAuthAPIServerController-WorkloadWorkloadController
2026-02-24T10:12:13.609840670+00:00 stderr F I0224 10:12:13.607076 1 base_controller.go:76] Waiting for caches to sync for OAuthServer-WorkloadWorkloadController
2026-02-24T10:12:13.610073047+00:00 stderr F I0224 10:12:13.610054 1 base_controller.go:76] Waiting for caches to sync for authentication-ManagementState
2026-02-24T10:12:13.610126508+00:00 stderr F I0224 10:12:13.610115 1 base_controller.go:76] Waiting for caches to sync for openshift-authentication-Metadata
2026-02-24T10:12:13.610173790+00:00 stderr F I0224 10:12:13.610164 1 base_controller.go:76] Waiting for caches to sync for OAuthClientsController
2026-02-24T10:12:13.610205731+00:00 stderr F I0224 10:12:13.610197 1 base_controller.go:76] Waiting for caches to sync for openshift-authentication-PayloadConfig
2026-02-24T10:12:13.610237802+00:00 stderr F I0224 10:12:13.610228 1 base_controller.go:76] Waiting for caches to sync for RouterCertsDomainValidationController
2026-02-24T10:12:13.610268713+00:00 stderr F I0224 10:12:13.610260 1 base_controller.go:76] Waiting for caches to sync for openshift-authentication-ServiceCA
2026-02-24T10:12:13.610318864+00:00 stderr F I0224 10:12:13.610299 1 base_controller.go:76] Waiting for caches to sync for oauth-server
2026-02-24T10:12:13.610366496+00:00 stderr F I0224 10:12:13.610332 1 base_controller.go:76] Waiting for caches to sync for openshift-authentication-UnsupportedConfigOverrides
2026-02-24T10:12:13.610387586+00:00 stderr F I0224 10:12:13.610372 1 base_controller.go:76] Waiting for caches to sync for LoggingSyncer
2026-02-24T10:12:13.610395856+00:00 stderr F I0224 10:12:13.610389 1 base_controller.go:76] Waiting for caches to sync for ConfigObserver
2026-02-24T10:12:13.610558112+00:00 stderr F I0224 10:12:13.610531 1 base_controller.go:76] Waiting for caches to sync for WellKnownReadyController
2026-02-24T10:12:13.610558112+00:00 stderr F I0224 10:12:13.605850 1 base_controller.go:76] Waiting for caches to sync for OAuthServerServiceEndpointAccessibleController
2026-02-24T10:12:13.610609394+00:00 stderr F I0224 10:12:13.610599 1 base_controller.go:76] Waiting for caches to sync for OpenshiftAuthenticationStaticResources-StaticResources
2026-02-24T10:12:13.610658345+00:00 stderr F I0224 10:12:13.610649 1 base_controller.go:76] Waiting for caches to sync for openshift-oauth-apiserver-EncryptionCondition
2026-02-24T10:12:13.610732487+00:00 stderr F I0224 10:12:13.610665 1 base_controller.go:76] Waiting for caches to sync for openshift-apiserver-APIService
2026-02-24T10:12:13.610780019+00:00 stderr F I0224 10:12:13.610764 1 base_controller.go:76] Waiting for caches to sync for StatusSyncer_authentication
2026-02-24T10:12:13.622544738+00:00 stderr F I0224 10:12:13.622379 1 reflector.go:368] Caches populated for operator.openshift.io/v1, Resource=authentications from k8s.io/client-go/dynamic/dynamicinformer/informer.go:108
2026-02-24T10:12:13.625693354+00:00 stderr F W0224 10:12:13.624488 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)
2026-02-24T10:12:13.625693354+00:00 stderr F E0224 10:12:13.624540 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)"
2026-02-24T10:12:13.625693354+00:00 stderr F I0224 10:12:13.624804 1 reflector.go:368] Caches populated for *v1.CertificateSigningRequest from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.625693354+00:00 stderr F I0224 10:12:13.625209 1 reflector.go:368] Caches populated for *v1alpha1.StorageVersionMigration from sigs.k8s.io/kube-storage-version-migrator/pkg/clients/informer/factory.go:132
2026-02-24T10:12:13.625693354+00:00 stderr F I0224 10:12:13.625432 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.625693354+00:00 stderr F I0224 10:12:13.625477 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.626826339+00:00 stderr F I0224 10:12:13.626231 1 reflector.go:368] Caches populated for *v1.Ingress from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:12:13.627403827+00:00 stderr F I0224 10:12:13.627381 1 reflector.go:368] Caches populated for *v1.Console from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:12:13.627637214+00:00 stderr F I0224 10:12:13.627592 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.627945714+00:00 stderr F I0224 10:12:13.627930 1 reflector.go:368] Caches populated for *v1.Infrastructure from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:12:13.627988065+00:00 stderr F I0224 10:12:13.627967 1 reflector.go:368] Caches populated for *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:12:13.629025457+00:00 stderr F I0224 10:12:13.628512 1 reflector.go:368] Caches populated for *v1.APIServer from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:12:13.629360107+00:00 stderr F I0224 10:12:13.629337 1 reflector.go:368] Caches populated for *v1.APIService from k8s.io/kube-aggregator/pkg/client/informers/externalversions/factory.go:141
2026-02-24T10:12:13.629535832+00:00 stderr F I0224 10:12:13.629520 1 reflector.go:368] Caches populated for *v1.Role from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.630018547+00:00 stderr F I0224 10:12:13.630002 1 reflector.go:368] Caches populated for *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:12:13.630073738+00:00 stderr F I0224 10:12:13.630053 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.630348917+00:00 stderr F I0224 10:12:13.630325 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.630459461+00:00 stderr F W0224 10:12:13.630329 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)
2026-02-24T10:12:13.630500812+00:00 stderr F E0224 10:12:13.630482 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)"
2026-02-24T10:12:13.633377270+00:00 stderr F I0224 10:12:13.632946 1 reflector.go:368] Caches populated for *v1.Authentication from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:12:13.680583284+00:00 stderr F I0224 10:12:13.673221 1 reflector.go:368] Caches populated for *v1.IngressController from github.com/openshift/client-go/operator/informers/externalversions/factory.go:125
2026-02-24T10:12:13.680583284+00:00 stderr F I0224 10:12:13.675488 1 reflector.go:368] Caches populated for *v1.ClusterRoleBinding from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.680583284+00:00 stderr F I0224 10:12:13.676900 1 reflector.go:368] Caches populated for *v1.RoleBinding from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.680583284+00:00 stderr F I0224 10:12:13.677844 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.680583284+00:00 stderr F I0224 10:12:13.680055 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.681708028+00:00 stderr F I0224 10:12:13.681668 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.682728119+00:00 stderr F I0224 10:12:13.682710 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.685752731+00:00 stderr F E0224 10:12:13.685726 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.687856296+00:00 stderr F E0224 10:12:13.687840 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.693025474+00:00 stderr F I0224 10:12:13.688961 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.693025474+00:00 stderr F I0224 10:12:13.690968 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.724193458+00:00 stderr F I0224 10:12:13.722099 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.724193458+00:00 stderr F I0224 10:12:13.722377 1 base_controller.go:82] Caches are synced for openshift-authentication-IngressNodesAvailable
2026-02-24T10:12:13.724193458+00:00 stderr F I0224 10:12:13.722437 1 base_controller.go:119] Starting #1 worker of openshift-authentication-IngressNodesAvailable controller ...
2026-02-24T10:12:13.724463916+00:00 stderr F I0224 10:12:13.724439 1 base_controller.go:82] Caches are synced for openshift-authentication-RemoveStaleConditions
2026-02-24T10:12:13.724501377+00:00 stderr F I0224 10:12:13.724491 1 base_controller.go:119] Starting #1 worker of openshift-authentication-RemoveStaleConditions controller ...
2026-02-24T10:12:13.724559079+00:00 stderr F I0224 10:12:13.724550 1 base_controller.go:82] Caches are synced for WebhookAuthenticatorCertApprover_OpenShiftAuthenticator
2026-02-24T10:12:13.724583989+00:00 stderr F I0224 10:12:13.724573 1 base_controller.go:119] Starting #1 worker of WebhookAuthenticatorCertApprover_OpenShiftAuthenticator controller ...
2026-02-24T10:12:13.725005252+00:00 stderr F I0224 10:12:13.724953 1 base_controller.go:82] Caches are synced for auditPolicyController
2026-02-24T10:12:13.725005252+00:00 stderr F I0224 10:12:13.724974 1 base_controller.go:119] Starting #1 worker of auditPolicyController controller ...
2026-02-24T10:12:13.725073194+00:00 stderr F I0224 10:12:13.725036 1 base_controller.go:82] Caches are synced for APIServerStaticResources-StaticResources
2026-02-24T10:12:13.725097405+00:00 stderr F I0224 10:12:13.725079 1 base_controller.go:119] Starting #1 worker of APIServerStaticResources-StaticResources controller ...
2026-02-24T10:12:13.725138616+00:00 stderr F I0224 10:12:13.725121 1 base_controller.go:82] Caches are synced for authentication-ManagementState
2026-02-24T10:12:13.725138616+00:00 stderr F I0224 10:12:13.725131 1 base_controller.go:119] Starting #1 worker of authentication-ManagementState controller ...
2026-02-24T10:12:13.725147776+00:00 stderr F I0224 10:12:13.725130 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'FastControllerResync' Controller "auditPolicyController" resync interval is set to 10s which might lead to client request throttling
2026-02-24T10:12:13.725185527+00:00 stderr F I0224 10:12:13.725169 1 base_controller.go:82] Caches are synced for openshift-authentication-UnsupportedConfigOverrides
2026-02-24T10:12:13.725185527+00:00 stderr F I0224 10:12:13.725178 1 base_controller.go:119] Starting #1 worker of openshift-authentication-UnsupportedConfigOverrides controller ...
2026-02-24T10:12:13.725682413+00:00 stderr F I0224 10:12:13.725666 1 base_controller.go:82] Caches are synced for LoggingSyncer
2026-02-24T10:12:13.725723344+00:00 stderr F I0224 10:12:13.725714 1 base_controller.go:119] Starting #1 worker of LoggingSyncer controller ...
2026-02-24T10:12:13.735128792+00:00 stderr F I0224 10:12:13.732773 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.754416242+00:00 stderr F I0224 10:12:13.753926 1 reflector.go:368] Caches populated for *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:12:13.775982562+00:00 stderr F I0224 10:12:13.775005 1 reflector.go:368] Caches populated for *v1.OAuth from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:12:13.811679843+00:00 stderr F I0224 10:12:13.811601 1 base_controller.go:82] Caches are synced for StatusSyncer_authentication
2026-02-24T10:12:13.811679843+00:00 stderr F I0224 10:12:13.811638 1 base_controller.go:119] Starting #1 worker of StatusSyncer_authentication controller ...
2026-02-24T10:12:13.823049591+00:00 stderr F I0224 10:12:13.822625 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"APIServerDeployment_UnavailablePod::CustomRouteController_SyncError::IngressStateEndpoints_NonReadyEndpoints::OAuthServerRouteEndpointAccessibleController_SyncError::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: PreconditionNotReady\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused","reason":"APIServerDeployment_NoPod::APIServices_PreconditionNotReady::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:13.852769290+00:00 stderr F E0224 10:12:13.852495 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.854654988+00:00 stderr F E0224 10:12:13.854580 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:13.863042934+00:00 stderr F I0224 10:12:13.862198 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:13.986010326+00:00 stderr F I0224 10:12:13.985746 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"APIServerDeployment_UnavailablePod::CustomRouteController_SyncError::IngressStateEndpoints_NonReadyEndpoints::OAuthServerRouteEndpointAccessibleController_SyncError::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: PreconditionNotReady\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused","reason":"APIServerDeployment_NoPod::APIServices_PreconditionNotReady::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:13.986010326+00:00 stderr F I0224 10:12:13.985845 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded changed from False to True ("APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready"),Available message changed from "APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: PreconditionNotReady\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused" to "APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: PreconditionNotReady\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:12:14.052931672+00:00 stderr F I0224 10:12:14.052242 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:14.176606785+00:00 stderr F E0224 10:12:14.175388 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:14.183325201+00:00 stderr F E0224 10:12:14.182195 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:14.193751299+00:00 stderr F E0224 10:12:14.192981 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:12:14.257604612+00:00 stderr F I0224 10:12:14.257304 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:14.315413480+00:00 stderr F I0224 10:12:14.312351 1 base_controller.go:82] Caches are synced for OpenShiftAuthenticatorCertRequester
2026-02-24T10:12:14.315413480+00:00 stderr F I0224 10:12:14.312380 1 base_controller.go:119] Starting #1 worker of OpenShiftAuthenticatorCertRequester controller ...
2026-02-24T10:12:14.315413480+00:00 stderr F I0224 10:12:14.313261 1 base_controller.go:82] Caches are synced for WebhookAuthenticatorController
2026-02-24T10:12:14.315413480+00:00 stderr F I0224 10:12:14.313268 1 base_controller.go:119] Starting #1 worker of WebhookAuthenticatorController controller ...
2026-02-24T10:12:14.315413480+00:00 stderr F I0224 10:12:14.313298 1 base_controller.go:82] Caches are synced for RevisionController
2026-02-24T10:12:14.315413480+00:00 stderr F I0224 10:12:14.313302 1 base_controller.go:119] Starting #1 worker of RevisionController controller ...
2026-02-24T10:12:14.451617696+00:00 stderr F I0224 10:12:14.450737 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:14.504205315+00:00 stderr F I0224 10:12:14.504161 1 base_controller.go:82] Caches are synced for openshift-oauth-apiserver-EncryptionPrune
2026-02-24T10:12:14.504252866+00:00 stderr F I0224 10:12:14.504242 1 base_controller.go:119] Starting #1 worker of openshift-oauth-apiserver-EncryptionPrune controller ...
2026-02-24T10:12:14.505986909+00:00 stderr F I0224 10:12:14.505911 1 base_controller.go:82] Caches are synced for openshift-oauth-apiserver-EncryptionKey
2026-02-24T10:12:14.505986909+00:00 stderr F I0224 10:12:14.505957 1 base_controller.go:119] Starting #1 worker of openshift-oauth-apiserver-EncryptionKey controller ...
2026-02-24T10:12:14.507011840+00:00 stderr F I0224 10:12:14.506840 1 base_controller.go:82] Caches are synced for openshift-oauth-apiserver-EncryptionState
2026-02-24T10:12:14.507011840+00:00 stderr F I0224 10:12:14.506863 1 base_controller.go:119] Starting #1 worker of openshift-oauth-apiserver-EncryptionState controller ...
2026-02-24T10:12:14.507011840+00:00 stderr F I0224 10:12:14.506887 1 base_controller.go:82] Caches are synced for openshift-oauth-apiserver-EncryptionMigration
2026-02-24T10:12:14.507011840+00:00 stderr F I0224 10:12:14.506892 1 base_controller.go:119] Starting #1 worker of openshift-oauth-apiserver-EncryptionMigration controller ...
2026-02-24T10:12:14.507011840+00:00 stderr F I0224 10:12:14.506916 1 base_controller.go:82] Caches are synced for NamespaceFinalizerController_openshift-oauth-apiserver
2026-02-24T10:12:14.507011840+00:00 stderr F I0224 10:12:14.506920 1 base_controller.go:119] Starting #1 worker of NamespaceFinalizerController_openshift-oauth-apiserver controller ...
2026-02-24T10:12:14.507011840+00:00 stderr F I0224 10:12:14.506930 1 base_controller.go:82] Caches are synced for SecretRevisionPruneController
2026-02-24T10:12:14.507011840+00:00 stderr F I0224 10:12:14.506933 1 base_controller.go:119] Starting #1 worker of SecretRevisionPruneController controller ...
2026-02-24T10:12:14.510925200+00:00 stderr F I0224 10:12:14.510864 1 base_controller.go:82] Caches are synced for openshift-oauth-apiserver-EncryptionCondition
2026-02-24T10:12:14.510925200+00:00 stderr F I0224 10:12:14.510914 1 base_controller.go:119] Starting #1 worker of openshift-oauth-apiserver-EncryptionCondition controller ...
2026-02-24T10:12:14.654160811+00:00 stderr F I0224 10:12:14.654105 1 request.go:700] Waited for 1.049388497s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/endpoints?limit=500&resourceVersion=0
2026-02-24T10:12:14.662622060+00:00 stderr F I0224 10:12:14.662050 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:14.768232009+00:00 stderr F W0224 10:12:14.768171 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)
2026-02-24T10:12:14.768258030+00:00 stderr F E0224 10:12:14.768222 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)"
2026-02-24T10:12:14.812702710+00:00 stderr F W0224 10:12:14.812438 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)
2026-02-24T10:12:14.812702710+00:00 stderr F E0224 10:12:14.812501 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)"
2026-02-24T10:12:14.825469020+00:00 stderr F E0224 10:12:14.822954 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:14.828217994+00:00 stderr F E0224 10:12:14.827541 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:14.856838040+00:00 stderr F I0224 10:12:14.856775 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:14.919959451+00:00 stderr F I0224 10:12:14.917001 1 base_controller.go:82] Caches are synced for openshift-apiserver-APIService
2026-02-24T10:12:14.919959451+00:00 stderr F I0224 10:12:14.917381 1 base_controller.go:119] Starting #1 worker of openshift-apiserver-APIService controller ...
2026-02-24T10:12:14.919959451+00:00 stderr F I0224 10:12:14.918234 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'FastControllerResync' Controller "openshift-apiserver-APIService" resync interval is set to 10s which might lead to client request throttling
2026-02-24T10:12:15.061986864+00:00 stderr F I0224 10:12:15.053880 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:15.256248966+00:00 stderr F I0224 10:12:15.253951 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:15.310433104+00:00 stderr F I0224 10:12:15.309629 1 base_controller.go:82] Caches are synced for OAuthAPIServerController-WorkloadWorkloadController
2026-02-24T10:12:15.310433104+00:00 stderr F I0224 10:12:15.309661 1 base_controller.go:119] Starting #1 worker of OAuthAPIServerController-WorkloadWorkloadController controller ...
2026-02-24T10:12:15.479189095+00:00 stderr F I0224 10:12:15.478518 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:15.654341532+00:00 stderr F I0224 10:12:15.653372 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:15.853632448+00:00 stderr F I0224 10:12:15.853503 1 request.go:700] Waited for 2.248446229s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-etcd/endpoints?limit=500&resourceVersion=0
2026-02-24T10:12:15.856258787+00:00 stderr F I0224 10:12:15.856015 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:15.907291459+00:00 stderr F I0224 10:12:15.907242 1 base_controller.go:82] Caches are synced for ConfigObserver
2026-02-24T10:12:15.907349950+00:00 stderr F I0224 10:12:15.907339 1 base_controller.go:119] Starting #1 worker of ConfigObserver controller ...
2026-02-24T10:12:16.054156491+00:00 stderr F I0224 10:12:16.051321 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:16.090188483+00:00 stderr F W0224 10:12:16.089779 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:12:16.090188483+00:00 stderr F W0224 10:12:16.090153 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:16.106795170+00:00 stderr F E0224 10:12:16.105852 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:16.109697789+00:00 stderr F E0224 10:12:16.109659 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:16.125145401+00:00 stderr F E0224 10:12:16.124997 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:16.125145401+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: endpoints for service/api in "openshift-oauth-apiserver" have no addresses with port name "https"
2026-02-24T10:12:16.125145401+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: endpoints for service/api in "openshift-oauth-apiserver" have no addresses with port name "https"
2026-02-24T10:12:16.125145401+00:00 stderr F >
2026-02-24T10:12:16.166487086+00:00 stderr F W0224 10:12:16.165677 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:12:16.166562268+00:00 stderr F W0224 10:12:16.166547 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:16.167188268+00:00 stderr F I0224 10:12:16.167147 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"APIServerDeployment_UnavailablePod::CustomRouteController_SyncError::IngressStateEndpoints_NonReadyEndpoints::OAuthServerRouteEndpointAccessibleController_SyncError::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: endpoints for service/api in \"openshift-oauth-apiserver\" have no addresses with port name \"https\"\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: endpoints for service/api in \"openshift-oauth-apiserver\" have no addresses with port name \"https\"\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused","reason":"APIServerDeployment_NoPod::APIServices_Error::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:16.181757783+00:00 stderr F I0224 10:12:16.181707 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: PreconditionNotReady\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused" to "APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: endpoints for service/api in \"openshift-oauth-apiserver\" have no addresses with port name \"https\"\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: endpoints for service/api in \"openshift-oauth-apiserver\" have no addresses with port name \"https\"\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:12:16.219534319+00:00 stderr F I0224 10:12:16.219472 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"APIServerDeployment_UnavailablePod::CustomRouteController_SyncError::IngressStateEndpoints_NonReadyEndpoints::OAuthServerRouteEndpointAccessibleController_SyncError::OAuthServerServiceEndpointAccessibleController_SyncError::OAuthServerServiceEndpointsEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused","reason":"APIServerDeployment_NoPod::APIServices_Error::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:16.229553515+00:00 stderr F I0224 10:12:16.229223 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: endpoints for service/api in \"openshift-oauth-apiserver\" have no addresses with port name \"https\"\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: endpoints for service/api in \"openshift-oauth-apiserver\" have no addresses with port name \"https\"\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused" to "APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:12:16.250387212+00:00 stderr F I0224 10:12:16.249838 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:16.253197968+00:00 stderr F E0224 10:12:16.253158 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:16.253197968+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:16.253197968+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:16.253197968+00:00 stderr F >
2026-02-24T10:12:16.274309114+00:00 stderr F E0224 10:12:16.273421 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:16.274309114+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:16.274309114+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:16.274309114+00:00 stderr F >
2026-02-24T10:12:16.311736889+00:00 stderr F E0224 10:12:16.311263 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:16.311736889+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:16.311736889+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:16.311736889+00:00 stderr F >
2026-02-24T10:12:16.327142470+00:00 stderr F E0224 10:12:16.326944 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:16.327142470+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:16.327142470+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:16.327142470+00:00 stderr F >
2026-02-24T10:12:16.454415023+00:00 stderr F I0224 10:12:16.453742 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:16.492655302+00:00 stderr F E0224 10:12:16.491506 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:16.492655302+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:16.492655302+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:16.492655302+00:00 stderr F >
2026-02-24T10:12:16.655610336+00:00 stderr F I0224 10:12:16.652592 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:16.704525482+00:00 stderr F W0224 10:12:16.704175 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)
2026-02-24T10:12:16.704525482+00:00 stderr F E0224 10:12:16.704232 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)"
2026-02-24T10:12:16.856947844+00:00 stderr F I0224 10:12:16.855514 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:16.911339528+00:00 stderr F E0224 10:12:16.911294 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:16.911339528+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:16.911339528+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:16.911339528+00:00 stderr F >
2026-02-24T10:12:17.013338858+00:00 stderr F W0224 10:12:17.013298 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)
2026-02-24T10:12:17.013429450+00:00 stderr F E0224 10:12:17.013415 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)"
2026-02-24T10:12:17.049343859+00:00 stderr F I0224 10:12:17.049281 1 request.go:700] Waited for 3.443409839s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services?limit=500&resourceVersion=0
2026-02-24T10:12:17.051837275+00:00 stderr F I0224 10:12:17.051792 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:17.256762093+00:00 stderr F I0224 10:12:17.256486 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:17.289122093+00:00 stderr F E0224 10:12:17.286911 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:17.289122093+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:17.289122093+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:17.289122093+00:00 stderr F >
2026-02-24T10:12:17.453719986+00:00 stderr F I0224 10:12:17.453660 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:17.507242014+00:00 stderr F I0224 10:12:17.507188 1 base_controller.go:82] Caches are synced for openshift-authentication-IngressState
2026-02-24T10:12:17.507309036+00:00 stderr F I0224 10:12:17.507296 1 base_controller.go:119] Starting #1 worker of openshift-authentication-IngressState controller ...
2026-02-24T10:12:17.761169160+00:00 stderr F I0224 10:12:17.756165 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:17.810977624+00:00 stderr F I0224 10:12:17.807258 1 base_controller.go:82] Caches are synced for TrustDistributionController
2026-02-24T10:12:17.810977624+00:00 stderr F I0224 10:12:17.807286 1 base_controller.go:119] Starting #1 worker of TrustDistributionController controller ...
2026-02-24T10:12:17.810977624+00:00 stderr F I0224 10:12:17.810525 1 base_controller.go:82] Caches are synced for RouterCertsDomainValidationController
2026-02-24T10:12:17.810977624+00:00 stderr F I0224 10:12:17.810557 1 base_controller.go:119] Starting #1 worker of RouterCertsDomainValidationController controller ...
2026-02-24T10:12:17.860037135+00:00 stderr F I0224 10:12:17.858653 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:12:17.910648653+00:00 stderr F I0224 10:12:17.909464 1 base_controller.go:82] Caches are synced for OAuthServerServiceEndpointsEndpointAccessibleController
2026-02-24T10:12:17.910648653+00:00 stderr F I0224 10:12:17.909489 1 base_controller.go:119] Starting #1 worker of OAuthServerServiceEndpointsEndpointAccessibleController controller ...
2026-02-24T10:12:17.910741685+00:00 stderr F I0224 10:12:17.910720 1 base_controller.go:82] Caches are synced for OAuthServerServiceEndpointAccessibleController
2026-02-24T10:12:17.910772216+00:00 stderr F I0224 10:12:17.910762 1 base_controller.go:119] Starting #1 worker of OAuthServerServiceEndpointAccessibleController controller ...
2026-02-24T10:12:17.910819518+00:00 stderr F I0224 10:12:17.910811 1 base_controller.go:82] Caches are synced for oauth-server
2026-02-24T10:12:17.910840798+00:00 stderr F I0224 10:12:17.910832 1 base_controller.go:119] Starting #1 worker of oauth-server controller ...
2026-02-24T10:12:17.911079425+00:00 stderr F I0224 10:12:17.910875 1 base_controller.go:82] Caches are synced for ConfigObserver
2026-02-24T10:12:17.911120217+00:00 stderr F I0224 10:12:17.911101 1 base_controller.go:119] Starting #1 worker of ConfigObserver controller ...
2026-02-24T10:12:17.913493890+00:00 stderr F I0224 10:12:17.912681 1 base_controller.go:82] Caches are synced for OpenshiftAuthenticationStaticResources-StaticResources
2026-02-24T10:12:17.913493890+00:00 stderr F I0224 10:12:17.912696 1 base_controller.go:119] Starting #1 worker of OpenshiftAuthenticationStaticResources-StaticResources controller ...
2026-02-24T10:12:17.913493890+00:00 stderr F I0224 10:12:17.912723 1 base_controller.go:82] Caches are synced for openshift-authentication-ServiceCA
2026-02-24T10:12:17.913493890+00:00 stderr F I0224 10:12:17.912728 1 base_controller.go:119] Starting #1 worker of openshift-authentication-ServiceCA controller ...
2026-02-24T10:12:17.951906584+00:00 stderr F W0224 10:12:17.951545 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:17.962746416+00:00 stderr F E0224 10:12:17.962544 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:17.962746416+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:17.962746416+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:17.962746416+00:00 stderr F >
2026-02-24T10:12:17.973919628+00:00 stderr F W0224 10:12:17.973852 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerServiceEndpointAccessibleControllerAvailable"].message is missing; this will eventually be fatal
2026-02-24T10:12:18.036276764+00:00 stderr F I0224 10:12:18.036221 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused","reason":"APIServerDeployment_UnavailablePod::CustomRouteController_SyncError::IngressStateEndpoints_NonReadyEndpoints::OAuthServerRouteEndpointAccessibleController_SyncError::OAuthServerServiceEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused","reason":"APIServerDeployment_NoPod::APIServices_Error::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:18.050190190+00:00 stderr F I0224 10:12:18.046580 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" to "APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:12:18.057375001+00:00 stderr F I0224 10:12:18.056734 1 request.go:700] Waited for 4.331590035s due to client-side throttling, not priority and fairness, request: POST:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events
2026-02-24T10:12:18.057375001+00:00 stderr F W0224 10:12:18.056818 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerServiceEndpointAccessibleControllerDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:18.060541407+00:00 stderr F I0224 10:12:18.060497 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused","reason":"APIServerDeployment_UnavailablePod::CustomRouteController_SyncError::IngressStateEndpoints_NonReadyEndpoints::OAuthServerRouteEndpointAccessibleController_SyncError::OAuthServerServiceEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused","reason":"APIServerDeployment_NoPod::APIServices_Error::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:18.104881013+00:00 stderr F I0224 10:12:18.103749 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused" to "APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:18.248091904+00:00 stderr F I0224 10:12:18.234591 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused","reason":"APIServerDeployment_UnavailablePod::CustomRouteController_SyncError::IngressStateEndpoints_NonReadyEndpoints::OAuthServerRouteEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused","reason":"APIServerDeployment_NoPod::APIServices_Error::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:18.271287602+00:00 stderr F I0224 10:12:18.252923 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused\nOAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused" to "APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:18.671066330+00:00 stderr F E0224 10:12:18.670651 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:18.676366983+00:00 stderr F E0224 10:12:18.675626 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:18.858539114+00:00 stderr F I0224 10:12:18.858476 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NoValidCertificateFound' No valid client certificate for OpenShiftAuthenticatorCertRequester is found: part of the certificate is expired: sub: CN=system:serviceaccount:openshift-oauth-apiserver:openshift-authenticator, notAfter: 2026-02-24 06:00:04 +0000 UTC
2026-02-24T10:12:18.863707952+00:00 stderr F I0224 10:12:18.863299 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRApproval' The CSR "system:openshift:openshift-authenticator-dhxws" has been approved
2026-02-24T10:12:18.865557089+00:00 stderr F I0224 10:12:18.865150 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRCreated' A csr "system:openshift:openshift-authenticator-dhxws" is created for OpenShiftAuthenticatorCertRequester
2026-02-24T10:12:19.242811947+00:00 stderr F E0224 10:12:19.238625 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:19.242811947+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:19.242811947+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:19.242811947+00:00 stderr F >
2026-02-24T10:12:19.261742457+00:00 stderr F I0224 10:12:19.259132 1 request.go:700] Waited for 4.750110935s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver
2026-02-24T10:12:19.281960995+00:00 stderr F E0224 10:12:19.280114 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:19.281960995+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:19.281960995+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:19.281960995+00:00 stderr F >
2026-02-24T10:12:19.306143664+00:00 stderr F E0224 10:12:19.306081 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:19.306143664+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:19.306143664+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:19.306143664+00:00 stderr F >
2026-02-24T10:12:20.448473203+00:00 stderr F I0224 10:12:20.447561 1 request.go:700] Waited for 2.533821929s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/configmaps/v4-0-config-system-service-ca
2026-02-24T10:12:21.211536522+00:00 stderr F W0224 10:12:21.211245 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)
2026-02-24T10:12:21.211584613+00:00 stderr F E0224 10:12:21.211536 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)"
2026-02-24T10:12:21.448453098+00:00 stderr F I0224 10:12:21.447994 1 request.go:700] Waited for 2.589398708s due to client-side throttling, not priority and fairness, request: POST:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events
2026-02-24T10:12:21.811272136+00:00 stderr F E0224 10:12:21.807199 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:21.811272136+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:21.811272136+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:21.811272136+00:00 stderr F >
2026-02-24T10:12:21.854814767+00:00 stderr F E0224 10:12:21.851547 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:21.854814767+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:21.854814767+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:21.854814767+00:00 stderr F >
2026-02-24T10:12:21.878977806+00:00 stderr F E0224 10:12:21.878163 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:21.878977806+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:21.878977806+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:21.878977806+00:00 stderr F >
2026-02-24T10:12:21.918356450+00:00 stderr F E0224 10:12:21.914634 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:21.918356450+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:21.918356450+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:21.918356450+00:00 stderr F >
2026-02-24T10:12:22.449102493+00:00 stderr F I0224 10:12:22.448209 1 request.go:700] Waited for 2.790590132s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/etcd-serving-ca
2026-02-24T10:12:22.460095370+00:00 stderr F W0224 10:12:22.460025 1 reflector.go:561] github.com/openshift/client-go/route/informers/externalversions/factory.go:125: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)
2026-02-24T10:12:22.460126681+00:00 stderr F E0224 10:12:22.460093 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/route/informers/externalversions/factory.go:125: Failed to watch *v1.Route: failed to list *v1.Route: the server is currently unable to handle the request (get routes.route.openshift.io)"
2026-02-24T10:12:22.654526427+00:00 stderr F W0224 10:12:22.654213 1 dynamic_operator_client.go:352] .status.conditions["IngressStateEndpointsDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:12:22.654526427+00:00 stderr F W0224 10:12:22.654499 1 dynamic_operator_client.go:355] .status.conditions["IngressStateEndpointsDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:22.654526427+00:00 stderr F W0224 10:12:22.654504 1 dynamic_operator_client.go:352] .status.conditions["IngressStatePodsDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:12:22.654526427+00:00 stderr F W0224 10:12:22.654509 1 dynamic_operator_client.go:355] .status.conditions["IngressStatePodsDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:22.691982192+00:00 stderr F I0224 10:12:22.691920 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused","reason":"APIServerDeployment_UnavailablePod::CustomRouteController_SyncError::OAuthServerRouteEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused","reason":"APIServerDeployment_NoPod::APIServices_Error::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:22.702306838+00:00 stderr F I0224 10:12:22.702183 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nIngressStateEndpointsDegraded: All 1 endpoints for oauth-server are reporting 'not ready'\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused" to "APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:23.452348779+00:00 stderr F I0224 10:12:23.451542 1 request.go:700] Waited for 2.200381889s due to client-side throttling, not priority and fairness, request: POST:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events
2026-02-24T10:12:23.796605428+00:00 stderr F E0224 10:12:23.796438 1 configmap_cafile_content.go:246] "Unhandled Error" err="kube-system/extension-apiserver-authentication failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:23.798238468+00:00 stderr F E0224 10:12:23.798194 1 configmap_cafile_content.go:246] "Unhandled Error" err="key failed with : missing content for CA bundle \"client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file\""
2026-02-24T10:12:23.852644992+00:00 stderr F I0224 10:12:23.852591 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClientCertificateCreated' A new client certificate for OpenShiftAuthenticatorCertRequester is available
2026-02-24T10:12:24.059649773+00:00 stderr F W0224 10:12:24.058973 1 dynamic_operator_client.go:355] .status.conditions["APIServerDeploymentAvailable"].message is missing; this will eventually be fatal
2026-02-24T10:12:24.059649773+00:00 stderr F W0224 10:12:24.059619 1 dynamic_operator_client.go:355] .status.conditions["APIServerDeploymentDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:24.059649773+00:00 stderr F W0224 10:12:24.059625 1 dynamic_operator_client.go:355] .status.conditions["APIServerDeploymentProgressing"].message is missing; this will eventually be fatal
2026-02-24T10:12:24.059649773+00:00 stderr F W0224 10:12:24.059632 1 dynamic_operator_client.go:352] .status.conditions["APIServerWorkloadDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:12:24.059649773+00:00 stderr F W0224 10:12:24.059636 1 dynamic_operator_client.go:355] .status.conditions["APIServerWorkloadDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:24.092186778+00:00 stderr F I0224 10:12:24.091715 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"CustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused","reason":"CustomRouteController_SyncError::OAuthServerRouteEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused","reason":"APIServices_Error::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:24.099865003+00:00 stderr F I0224 10:12:24.099823 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "APIServerDeploymentDegraded: 1 of 1 requested instances are unavailable for apiserver.openshift-oauth-apiserver ()\nCustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused" to "CustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused",Available message changed from "APIServerDeploymentAvailable: no apiserver.openshift-oauth-apiserver pods available on any node.\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused" to "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:24.411326740+00:00 stderr F E0224 10:12:24.411281 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:24.411326740+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:24.411326740+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:24.411326740+00:00 stderr F >
2026-02-24T10:12:24.648485673+00:00 stderr F I0224 10:12:24.648429 1 request.go:700] Waited for 1.598169322s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift
2026-02-24T10:12:24.926963380+00:00 stderr F E0224 10:12:24.926113 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:24.926963380+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:24.926963380+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:24.926963380+00:00 stderr F >
2026-02-24T10:12:25.652128220+00:00 stderr F I0224 10:12:25.651013 1 request.go:700] Waited for 1.789237585s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-config/secrets/webhook-authentication-integrated-oauth
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.855104 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-02-23 05:08:32 +0000 UTC to 2035-02-21 05:08:32 +0000 UTC (now=2026-02-24 10:12:25.855073707 +0000 UTC))"
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.855139 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-02-23 05:08:33 +0000 UTC to 2035-02-21 05:08:33 +0000 UTC (now=2026-02-24 10:12:25.855126099 +0000 UTC))"
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.855160 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1740376476\" [] issuer=\"openshift-kube-controller-manager-operator_csr-signer-signer@1740376476\" (2025-02-24 05:54:36 +0000 UTC to 2027-02-24 05:54:36 +0000 UTC (now=2026-02-24 10:12:25.855145729 +0000 UTC))"
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.855177 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-controller-manager-operator_csr-signer-signer@1740376476\" [] issuer=\"\" (2025-02-24 05:54:35 +0000 UTC to 2027-02-24 05:54:36 +0000 UTC (now=2026-02-24 10:12:25.85516563 +0000 UTC))"
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.855194 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_kube-apiserver-to-kubelet-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:25.85518292 +0000 UTC))"
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.855216 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_kube-control-plane-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2028-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:25.855199521 +0000 UTC))"
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.855233 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:25.855221862 +0000 UTC))"
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.855249 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_aggregator-client-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:25.855237812 +0000 UTC))"
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.855410 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1740288168\" (2025-02-23 05:22:51 +0000 UTC to 2027-02-23 05:22:52 +0000 UTC (now=2026-02-24 10:12:25.855392857 +0000 UTC))"
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.855537 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771927933\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771927933\" (2026-02-24 09:12:12 +0000 UTC to 2027-02-24 09:12:12 +0000 UTC (now=2026-02-24 10:12:25.855526291 +0000 UTC))"
2026-02-24T10:12:25.856972995+00:00 stderr F I0224 10:12:25.856491 1 requestheader_controller.go:247] Loaded a new request header values for RequestHeaderAuthRequestController
2026-02-24T10:12:25.872105258+00:00 stderr F E0224 10:12:25.871963 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:25.872105258+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:25.872105258+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:25.872105258+00:00 stderr F >
2026-02-24T10:12:26.847936724+00:00 stderr F I0224 10:12:26.847619 1 request.go:700] Waited for 1.794805645s due to client-side throttling, not priority and fairness, request: POST:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events
2026-02-24T10:12:27.007817694+00:00 stderr F E0224 10:12:27.007749 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:27.007817694+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:27.007817694+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:27.007817694+00:00 stderr F >
2026-02-24T10:12:27.087493171+00:00 stderr F E0224 10:12:27.087440 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:27.087493171+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:27.087493171+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:27.087493171+00:00 stderr F >
2026-02-24T10:12:27.098937001+00:00 stderr F E0224 10:12:27.097846 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:27.098937001+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:27.098937001+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:27.098937001+00:00 stderr F >
2026-02-24T10:12:27.127620799+00:00 stderr F E0224 10:12:27.127391 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:27.127620799+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:27.127620799+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:27.127620799+00:00 stderr F >
2026-02-24T10:12:27.137436419+00:00 stderr F E0224 10:12:27.137277 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:27.137436419+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:27.137436419+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:27.137436419+00:00 stderr F >
2026-02-24T10:12:27.262880625+00:00 stderr F I0224 10:12:27.262096 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretUpdated' Updated Secret/webhook-authentication-integrated-oauth -n openshift-config because it changed
2026-02-24T10:12:27.406454207+00:00 stderr F E0224 10:12:27.406393 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:27.406454207+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:27.406454207+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:27.406454207+00:00 stderr F >
2026-02-24T10:12:27.847990241+00:00 stderr F I0224 10:12:27.847932 1 request.go:700] Waited for 1.344341527s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift
2026-02-24T10:12:28.076263183+00:00 stderr F E0224 10:12:28.075954 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:28.076263183+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:28.076263183+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:28.076263183+00:00 stderr F >
2026-02-24T10:12:28.204663091+00:00 stderr F E0224 10:12:28.204598 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:28.204663091+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:28.204663091+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:28.204663091+00:00 stderr F >
2026-02-24T10:12:28.604415537+00:00 stderr F E0224 10:12:28.604361 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:28.604415537+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:28.604415537+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:28.604415537+00:00 stderr F >
2026-02-24T10:12:28.848030498+00:00 stderr F I0224 10:12:28.847976 1 request.go:700] Waited for 1.39772903s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/trusted-ca-bundle
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249237 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-02-23 05:08:32 +0000 UTC to 2035-02-21 05:08:32 +0000 UTC (now=2026-02-24 10:12:29.249209458 +0000 UTC))"
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249453 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-02-23 05:08:33 +0000 UTC to 2035-02-21 05:08:33 +0000 UTC (now=2026-02-24 10:12:29.249443615 +0000 UTC))"
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249467 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1740376476\" [] issuer=\"openshift-kube-controller-manager-operator_csr-signer-signer@1740376476\" (2025-02-24 05:54:36 +0000 UTC to 2027-02-24 05:54:36 +0000 UTC (now=2026-02-24 10:12:29.249457876 +0000 UTC))"
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249481 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-controller-manager-operator_csr-signer-signer@1740376476\" [] issuer=\"\" (2025-02-24 05:54:35 +0000 UTC to 2027-02-24 05:54:36 +0000 UTC (now=2026-02-24 10:12:29.249472026 +0000 UTC))"
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249493 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_kube-apiserver-to-kubelet-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:29.249485487 +0000 UTC))"
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249506 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_kube-control-plane-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2028-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:29.249497347 +0000 UTC))"
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249529 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:29.249511597 +0000 UTC))"
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249541 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-controller-manager-operator_csr-signer-signer@1771927938\" [] issuer=\"\" (2026-02-24 10:12:18 +0000 UTC to 2028-02-24 10:12:19 +0000 UTC (now=2026-02-24 10:12:29.249532968 +0000 UTC))"
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249553 1 tlsconfig.go:181] "Loaded client CA" index=8 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_aggregator-client-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:12:29.249545058 +0000 UTC))"
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249686 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1740288168\" (2025-02-23 05:22:51 +0000 UTC to 2027-02-23 05:22:52 +0000 UTC (now=2026-02-24 10:12:29.249673992 +0000 UTC))"
2026-02-24T10:12:29.252941542+00:00 stderr F I0224 10:12:29.249774 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771927933\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771927933\" (2026-02-24 09:12:12 +0000 UTC to 2027-02-24 09:12:12 +0000 UTC (now=2026-02-24 10:12:29.249764565 +0000 UTC))"
2026-02-24T10:12:29.269902892+00:00 stderr F E0224 10:12:29.269819 1 base_controller.go:279] "Unhandled Error" err=<
2026-02-24T10:12:29.269902892+00:00 stderr F openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401
2026-02-24T10:12:29.269902892+00:00 stderr F apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401
2026-02-24T10:12:29.269902892+00:00 stderr F >
2026-02-24T10:12:29.857080820+00:00 stderr F I0224 10:12:29.856741 1 request.go:700] Waited for 1.404350152s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/secrets/openshift-authenticator-certs
2026-02-24T10:12:31.285494698+00:00 stderr F W0224 10:12:31.285428 1 reflector.go:561] github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)
2026-02-24T10:12:31.285494698+00:00 stderr F E0224 10:12:31.285481 1 reflector.go:158] "Unhandled Error" err="github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125: Failed to watch *v1.OAuthClient: failed to list *v1.OAuthClient: the server is currently unable to handle the request (get oauthclients.oauth.openshift.io)"
2026-02-24T10:12:31.551875205+00:00 stderr F W0224 10:12:31.551822 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:12:31.551875205+00:00 stderr F W0224 10:12:31.551842 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:31.575899231+00:00 stderr F E0224 10:12:31.575069 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401"
2026-02-24T10:12:31.585671620+00:00 stderr F I0224 10:12:31.585619 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"CustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused","reason":"CustomRouteController_SyncError::OAuthServerRouteEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused","reason":"APIServices_Error::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:31.599750240+00:00 stderr F I0224 10:12:31.599245 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.oauth.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/oauth.openshift.io/v1: 401\nAPIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused" to "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:31.614772159+00:00 stderr F W0224 10:12:31.614411 1 dynamic_operator_client.go:352] .status.conditions["APIServicesAvailable"].reason is missing; this will eventually be fatal
2026-02-24T10:12:31.614772159+00:00 stderr F W0224 10:12:31.614432 1 dynamic_operator_client.go:355] .status.conditions["APIServicesAvailable"].message is missing; this will eventually be fatal
2026-02-24T10:12:31.614772159+00:00 stderr F W0224 10:12:31.614436 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:12:31.614772159+00:00 stderr F W0224 10:12:31.614440 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:31.641180977+00:00 stderr F I0224 10:12:31.641114 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"CustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused","reason":"CustomRouteController_SyncError::OAuthServerRouteEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163-\u003e10.217.4.10:53: read: connection refused","reason":"OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:31.655984420+00:00 stderr F I0224 10:12:31.655514 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "APIServicesAvailable: apiservices.apiregistration.k8s.io/v1.user.openshift.io: not available: failing or missing response from https://10.217.0.9:8443/apis/user.openshift.io/v1: bad status from https://10.217.0.9:8443/apis/user.openshift.io/v1: 401\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused" to "OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused"
2026-02-24T10:12:32.648194997+00:00 stderr F I0224 10:12:32.648134 1 request.go:700] Waited for 1.059689321s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication
2026-02-24T10:12:33.506241901+00:00 stderr F I0224 10:12:33.506174 1 reflector.go:368] Caches populated for *v1.Route from github.com/openshift/client-go/route/informers/externalversions/factory.go:125
2026-02-24T10:12:33.506457327+00:00 stderr F I0224 10:12:33.506426 1 base_controller.go:82] Caches are synced for OAuthServerRouteEndpointAccessibleController
2026-02-24T10:12:33.506457327+00:00 stderr F I0224 10:12:33.506436 1 base_controller.go:82] Caches are synced for CustomRouteController
2026-02-24T10:12:33.506457327+00:00 stderr F I0224 10:12:33.506441 1 base_controller.go:119] Starting #1 worker of OAuthServerRouteEndpointAccessibleController controller ...
2026-02-24T10:12:33.506457327+00:00 stderr F I0224 10:12:33.506445 1 base_controller.go:119] Starting #1 worker of CustomRouteController controller ...
2026-02-24T10:12:33.506553720+00:00 stderr F I0224 10:12:33.506505 1 base_controller.go:82] Caches are synced for ProxyConfigController
2026-02-24T10:12:33.506553720+00:00 stderr F I0224 10:12:33.506548 1 base_controller.go:119] Starting #1 worker of ProxyConfigController controller ...
2026-02-24T10:12:33.507137369+00:00 stderr F I0224 10:12:33.507108 1 base_controller.go:82] Caches are synced for OAuthServer-WorkloadWorkloadController
2026-02-24T10:12:33.507137369+00:00 stderr F I0224 10:12:33.507119 1 base_controller.go:119] Starting #1 worker of OAuthServer-WorkloadWorkloadController controller ...
2026-02-24T10:12:33.510967766+00:00 stderr F I0224 10:12:33.510799 1 base_controller.go:82] Caches are synced for openshift-authentication-PayloadConfig
2026-02-24T10:12:33.510967766+00:00 stderr F I0224 10:12:33.510818 1 base_controller.go:119] Starting #1 worker of openshift-authentication-PayloadConfig controller ...
2026-02-24T10:12:33.510967766+00:00 stderr F I0224 10:12:33.510821 1 base_controller.go:82] Caches are synced for openshift-authentication-Metadata
2026-02-24T10:12:33.510967766+00:00 stderr F I0224 10:12:33.510831 1 base_controller.go:119] Starting #1 worker of openshift-authentication-Metadata controller ...
2026-02-24T10:12:33.510967766+00:00 stderr F I0224 10:12:33.510915 1 base_controller.go:82] Caches are synced for WellKnownReadyController
2026-02-24T10:12:33.510967766+00:00 stderr F I0224 10:12:33.510921 1 base_controller.go:119] Starting #1 worker of WellKnownReadyController controller ...
2026-02-24T10:12:33.594750158+00:00 stderr F W0224 10:12:33.594460 1 dynamic_operator_client.go:355] .status.conditions["CustomRouteControllerDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:33.599395551+00:00 stderr F I0224 10:12:33.598964 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"CustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929-\u003e10.217.4.10:53: read: connection refused","reason":"CustomRouteController_SyncError::OAuthServerRouteEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused","reason":"OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:33.612165101+00:00 stderr F I0224 10:12:33.612054 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:35163->10.217.4.10:53: read: connection refused" to "OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:33.629931235+00:00 stderr F E0224 10:12:33.627545 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:33.638250709+00:00 stderr F I0224 10:12:33.636425 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"CustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused","reason":"CustomRouteController_SyncError::OAuthServerRouteEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused","reason":"OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:33.645203451+00:00 stderr F I0224 10:12:33.643780 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "CustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp: lookup oauth-openshift.apps-crc.testing on 10.217.4.10:53: read udp 10.217.0.16:43929->10.217.4.10:53: read: connection refused" to "CustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:33.648691148+00:00 stderr F I0224 10:12:33.648648 1 request.go:700] Waited for 1.394647797s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/audit
2026-02-24T10:12:33.657982233+00:00 stderr F E0224 10:12:33.657325 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:33.667916547+00:00 stderr F I0224 10:12:33.667793 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"OAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused","reason":"OAuthServerRouteEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2025-02-24T06:27:45Z","message":"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused","reason":"OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:33.676146028+00:00 stderr F E0224 10:12:33.676061 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:33.678361686+00:00 stderr F I0224 10:12:33.678044 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "CustomRouteControllerDegraded: the server is currently unable to handle the request (get routes.route.openshift.io oauth-openshift)\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused" to "OAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:33.690370923+00:00 stderr F E0224 10:12:33.690342 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:33.707378133+00:00 stderr F E0224 10:12:33.707328 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:33.798732897+00:00 stderr F E0224 10:12:33.798682 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:33.976861665+00:00 stderr F E0224 10:12:33.976567 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:34.308329364+00:00 stderr F E0224 10:12:34.308029 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:34.847811114+00:00 stderr F I0224 10:12:34.847735 1 request.go:700] Waited for 1.398423422s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa
2026-02-24T10:12:34.963205974+00:00 stderr F E0224 10:12:34.963141 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused"
2026-02-24T10:12:35.848347826+00:00 stderr F I0224 10:12:35.848288 1 request.go:700] Waited for 2.185815504s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/audit
2026-02-24T10:12:36.257473379+00:00 stderr F W0224 10:12:36.257420 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerRouteEndpointAccessibleControllerAvailable"].message is missing; this will eventually be fatal
2026-02-24T10:12:36.281991769+00:00 stderr F W0224 10:12:36.281945 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerRouteEndpointAccessibleControllerDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:12:36.283068021+00:00 stderr F I0224 10:12:36.282878 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:13Z","message":"OAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": dial tcp 38.102.83.181:443: connect: connection refused","reason":"OAuthServerRouteEndpointAccessibleController_SyncError","status":"True","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:36.294859263+00:00 stderr F I0224 10:12:36.294809 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available changed from False to True ("All is well")
2026-02-24T10:12:36.316282688+00:00 stderr F I0224 10:12:36.316225 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2025-02-24T06:09:43Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:12:36.322726795+00:00 stderr F I0224 10:12:36.322657 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded changed from True to False ("All is well")
2026-02-24T10:12:37.048034439+00:00 stderr F I0224 10:12:37.047694 1 request.go:700] Waited for 2.190661543s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver
2026-02-24T10:12:38.048143318+00:00 stderr F I0224 10:12:38.048085 1 request.go:700] Waited for 1.791503964s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication
2026-02-24T10:12:39.247956234+00:00 stderr F I0224 10:12:39.247847 1 request.go:700] Waited for 1.59520202s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/audit
2026-02-24T10:12:40.447672708+00:00 stderr F I0224 10:12:40.447566 1 request.go:700] Waited for 1.59682194s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa
2026-02-24T10:12:41.994268101+00:00 stderr F I0224 10:12:41.448033 1 request.go:700] Waited for 1.396472901s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/secrets/openshift-authenticator-certs
2026-02-24T10:12:42.648271225+00:00 stderr F I0224 10:12:42.648176 1 request.go:700] Waited for 1.195635579s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/secrets/openshift-authenticator-certs
2026-02-24T10:12:47.827536784+00:00 stderr F I0224 10:12:47.826593 1 reflector.go:368] Caches populated for *v1.OAuthClient from github.com/openshift/client-go/oauth/informers/externalversions/factory.go:125
2026-02-24T10:12:47.910531232+00:00 stderr F I0224 10:12:47.910482 1 base_controller.go:82] Caches are synced for OAuthClientsController
2026-02-24T10:12:47.910609025+00:00 stderr F I0224 10:12:47.910599 1 base_controller.go:119] Starting #1 worker of OAuthClientsController controller ...
2026-02-24T10:13:13.125398122+00:00 stderr F I0224 10:13:13.124533 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretUpdated' Updated Secret/v4-0-config-user-idp-0-file-data -n openshift-authentication because it changed
2026-02-24T10:13:13.179666477+00:00 stderr F I0224 10:13:13.179539 1 apps.go:155] Deployment "openshift-authentication/oauth-openshift" changes: {"metadata":{"annotations":{"operator.openshift.io/rvs-hash":"-vDmjQilXbG0pbYCgKHXcpKdZY-PXR1WDa3Uz3nr5S9YCR83YITxWW4S92Y_HPdKm0PVM8lp9w7wtPbQXJNDOQ","operator.openshift.io/spec-hash":"05fcda79290a8bc8f19ac32e58b47b4171e7105753cedc1e853686dffe5e1df6"}},"spec":{"progressDeadlineSeconds":null,"revisionHistoryLimit":null,"template":{"metadata":{"annotations":{"operator.openshift.io/rvs-hash":"-vDmjQilXbG0pbYCgKHXcpKdZY-PXR1WDa3Uz3nr5S9YCR83YITxWW4S92Y_HPdKm0PVM8lp9w7wtPbQXJNDOQ"}},"spec":{"containers":[{"args":["if [ -s /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt ]; then\n echo \"Copying system trust bundle\"\n cp -f /var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle/ca-bundle.crt /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem\nfi\nexec oauth-server osinserver \\\n--config=/var/config/system/configmaps/v4-0-config-system-cliconfig/v4-0-config-system-cliconfig \\\n--v=2 \\\n--audit-log-format=json \\\n--audit-log-maxbackup=10 \\\n--audit-log-maxsize=100 \\\n--audit-log-path=/var/log/oauth-server/audit.log \\\n--audit-policy-file=/var/run/configmaps/audit/audit.yaml\n"],"command":["/bin/bash","-ec"],"image":"quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:b641ed0d63034b23d07eb0b2cd455390e83b186e77375e2d3f37633c1ddb0495","lifecycle":{"preStop":{"exec":{"command":["sleep","25"]}}},"livenessProbe":{"failureThreshold":3,"httpGet":{"path":"/healthz","port":6443,"scheme":"HTTPS"},"initialDelaySeconds":30,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":1},"name":"oauth-openshift","ports":[{"containerPort":6443,"name":"https","protocol":"TCP"}],"readinessProbe":{"failureThreshold":3,"httpGet":{"path":"/healthz","port":6443,"scheme":"HTTPS"},"periodSeconds":10,"successThreshold":1,"timeoutSeconds":1},"resources":{"requests":{"cpu":"10m","memory":"50Mi"}},"securityContext":{"privileged":true,"readOnlyRootFilesystem":false,"runAsUser":0},"terminationMessagePolicy":"FallbackToLogsOnError","volumeMounts":[{"mountPath":"/var/run/configmaps/audit","name":"audit-policies"},{"mountPath":"/var/log/oauth-server","name":"audit-dir"},{"mountPath":"/var/config/system/secrets/v4-0-config-system-session","name":"v4-0-config-system-session","readOnly":true},{"mountPath":"/var/config/system/configmaps/v4-0-config-system-cliconfig","name":"v4-0-config-system-cliconfig","readOnly":true},{"mountPath":"/var/config/system/secrets/v4-0-config-system-serving-cert","name":"v4-0-config-system-serving-cert","readOnly":true},{"mountPath":"/var/config/system/configmaps/v4-0-config-system-service-ca","name":"v4-0-config-system-service-ca","readOnly":true},{"mountPath":"/var/config/system/secrets/v4-0-config-system-router-certs","name":"v4-0-config-system-router-certs","readOnly":true},{"mountPath":"/var/config/system/secrets/v4-0-config-system-ocp-branding-template","name":"v4-0-config-system-ocp-branding-template","readOnly":true},{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-login","name":"v4-0-config-user-template-login","readOnly":true},{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-provider-selection","name":"v4-0-config-user-template-provider-selection","readOnly":true},{"mountPath":"/var/config/user/template/secret/v4-0-config-user-template-error","name":"v4-0-config-user-template-error","readOnly":true},{"mountPath":"/var/config/system/configmaps/v4-0-config-system-trusted-ca-bundle","name":"v4-0-config-system-trusted-ca-bundle","readOnly":true},{"mountPath":"/var/config/user/idp/0/secret/v4-0-config-user-idp-0-file-data","name":"v4-0-config-user-idp-0-file-data","readOnly":true}]}],"dnsPolicy":null,"restartPolicy":null,"schedulerName":null,"securityContext":null,"serviceAccount":null,"volumes":[{"configMap":{"name":"audit"},"name":"audit-policies"},{"hostPath":{"path":"/var/log/oauth-server"},"name":"audit-dir"},{"name":"v4-0-config-system-session","secret":{"secretName":"v4-0-config-system-session"}},{"configMap":{"name":"v4-0-config-system-cliconfig"},"name":"v4-0-config-system-cliconfig"},{"name":"v4-0-config-system-serving-cert","secret":{"secretName":"v4-0-config-system-serving-cert"}},{"configMap":{"name":"v4-0-config-system-service-ca"},"name":"v4-0-config-system-service-ca"},{"name":"v4-0-config-system-router-certs","secret":{"secretName":"v4-0-config-system-router-certs"}},{"name":"v4-0-config-system-ocp-branding-template","secret":{"secretName":"v4-0-config-system-ocp-branding-template"}},{"name":"v4-0-config-user-template-login","secret":{"optional":true,"secretName":"v4-0-config-user-template-login"}},{"name":"v4-0-config-user-template-provider-selection","secret":{"optional":true,"secretName":"v4-0-config-user-template-provider-selection"}},{"name":"v4-0-config-user-template-error","secret":{"optional":true,"secretName":"v4-0-config-user-template-error"}},{"configMap":{"name":"v4-0-config-system-trusted-ca-bundle","optional":true},"name":"v4-0-config-system-trusted-ca-bundle"},{"name":"v4-0-config-user-idp-0-file-data","secret":{"items":[{"key":"htpasswd","path":"htpasswd"}],"secretName":"v4-0-config-user-idp-0-file-data"}}]}}}}
2026-02-24T10:13:13.193059674+00:00 stderr F W0224 10:13:13.193002 1 warnings.go:70] spec.template.spec.nodeSelector[node-role.kubernetes.io/master]: use "node-role.kubernetes.io/control-plane" instead
2026-02-24T10:13:13.193598549+00:00 stderr F I0224 10:13:13.193569 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentUpdated' Updated Deployment.apps/oauth-openshift -n openshift-authentication because it changed
2026-02-24T10:13:13.196516373+00:00 stderr F W0224 10:13:13.196482 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerDeploymentAvailable"].message is missing; this will eventually be fatal
2026-02-24T10:13:13.196516373+00:00 stderr F W0224 10:13:13.196500 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerDeploymentDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:13.196516373+00:00 stderr F W0224 10:13:13.196506 1 dynamic_operator_client.go:352] .status.conditions["OAuthServerWorkloadDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:13.196516373+00:00 stderr F W0224 10:13:13.196510 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerWorkloadDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:13.254981000+00:00 stderr F I0224 10:13:13.254923 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 7, desired generation is 8.","reason":"OAuthServerDeployment_NewGeneration","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:13.273980669+00:00 stderr F I0224 10:13:13.270494 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Progressing changed from False to True ("OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 7, desired generation is 8.")
2026-02-24T10:13:13.315838037+00:00 stderr F E0224 10:13:13.315774 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:13.318269776+00:00 stderr F I0224 10:13:13.318223 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 7, desired generation is 8.","reason":"OAuthServerDeployment_NewGeneration","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:13.319354718+00:00 stderr F E0224 10:13:13.319321 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:13.326820633+00:00 stderr F E0224 10:13:13.326754 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:13.328062629+00:00 stderr F I0224 10:13:13.328026 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "All is well" to "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready"
2026-02-24T10:13:13.353370059+00:00 stderr F E0224 10:13:13.353308 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:13.361899946+00:00 stderr F E0224 10:13:13.360721 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:13.362186144+00:00 stderr F I0224 10:13:13.362064 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 7, desired generation is 8.","reason":"OAuthServerDeployment_NewGeneration","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:13.371642916+00:00 stderr F I0224 10:13:13.371589 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available changed from True to False ("OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF")
2026-02-24T10:13:13.388967956+00:00 stderr F E0224 10:13:13.388906 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:13.395396801+00:00 stderr F E0224 10:13:13.395347 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:13.403418263+00:00 stderr F I0224 10:13:13.403345 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 7, desired generation is 8.","reason":"OAuthServerDeployment_NewGeneration","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:13.405343769+00:00 stderr F E0224 10:13:13.405307 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:13.413194225+00:00 stderr F I0224 10:13:13.413142 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready" to "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:13.431515463+00:00 stderr F E0224 10:13:13.431456 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:13.449935005+00:00 stderr F E0224 10:13:13.442320 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:13.454784555+00:00 stderr F E0224 10:13:13.454722 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:13.475982577+00:00 stderr F E0224 10:13:13.475862 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:13.561761571+00:00 stderr F E0224 10:13:13.561690 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:13.569252538+00:00 stderr F E0224 10:13:13.569211 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:13.749465927+00:00 stderr F E0224 10:13:13.749426 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:14.081770095+00:00 stderr F E0224 10:13:14.080876 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:14.206570085+00:00 stderr F E0224 10:13:14.206501 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:14.311415460+00:00 stderr F I0224 10:13:14.311358 1 request.go:700] Waited for 1.117705379s due to client-side throttling, not priority and fairness, request: POST:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events
2026-02-24T10:13:14.716646562+00:00 stderr F W0224 10:13:14.716584 1 dynamic_operator_client.go:352] .status.conditions["IngressStatePodsDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:14.716730844+00:00 stderr F W0224 10:13:14.716715 1 dynamic_operator_client.go:355] .status.conditions["IngressStatePodsDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:14.732224701+00:00 stderr F E0224 10:13:14.732174 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:14.743719472+00:00 stderr F I0224 10:13:14.743674 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 7, desired generation is 8.","reason":"OAuthServerDeployment_NewGeneration","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:14.753105233+00:00 stderr F E0224 10:13:14.753056 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:14.758124949+00:00 stderr F I0224 10:13:14.758068 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF" to "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:14.767326404+00:00 stderr F E0224 10:13:14.767288 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:15.312179273+00:00 stderr F I0224 10:13:15.311652 1 request.go:700] Waited for 2.04112823s due to client-side throttling, not priority and fairness, request: POST:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events
2026-02-24T10:13:15.491025793+00:00 stderr F E0224 10:13:15.490988 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:16.029617963+00:00 stderr F E0224 10:13:16.029558 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:16.511812825+00:00 stderr F I0224 10:13:16.511743 1 request.go:700] Waited for 1.770194132s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift
2026-02-24T10:13:17.711560359+00:00 stderr F I0224 10:13:17.711059 1 request.go:700] Waited for 1.781468829s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs
2026-02-24T10:13:18.711167159+00:00 stderr F I0224 10:13:18.711109 1 request.go:700] Waited for 1.196420489s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/configmaps/v4-0-config-system-cliconfig
2026-02-24T10:13:19.712188530+00:00 stderr F I0224 10:13:19.711673 1 request.go:700] Waited for 1.146999074s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift
2026-02-24T10:13:20.617258703+00:00 stderr F E0224 10:13:20.617190 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:20.911724159+00:00 stderr F I0224 10:13:20.911671 1 request.go:700] Waited for 1.061069763s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/audit
2026-02-24T10:13:21.165198702+00:00 stderr F E0224 10:13:21.165150 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:22.568313374+00:00 stderr F I0224 10:13:22.567902 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2025-02-23 05:08:32 +0000 UTC to 2035-02-21 05:08:32 +0000 UTC (now=2026-02-24 10:13:22.567852461 +0000 UTC))"
2026-02-24T10:13:22.568313374+00:00 stderr F I0224 10:13:22.568141 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kubelet-bootstrap-kubeconfig-signer\" [] issuer=\"\" (2025-02-23 05:08:33 +0000 UTC to 2035-02-21 05:08:33 +0000 UTC (now=2026-02-24 10:13:22.568131809 +0000 UTC))"
2026-02-24T10:13:22.568313374+00:00 stderr F I0224 10:13:22.568157 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer_@1740376476\" [] issuer=\"openshift-kube-controller-manager-operator_csr-signer-signer@1740376476\" (2025-02-24 05:54:36 +0000 UTC to 2027-02-24 05:54:36 +0000 UTC (now=2026-02-24 10:13:22.568146149 +0000 UTC))"
2026-02-24T10:13:22.568313374+00:00 stderr F I0224 10:13:22.568169 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-controller-manager-operator_csr-signer-signer@1740376476\" [] issuer=\"\" (2025-02-24 05:54:35 +0000 UTC to 2027-02-24 05:54:36 +0000 UTC (now=2026-02-24 10:13:22.56816113 +0000 UTC))"
2026-02-24T10:13:22.568313374+00:00 stderr F I0224 10:13:22.568181 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_kube-apiserver-to-kubelet-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:13:22.56817391 +0000 UTC))"
2026-02-24T10:13:22.568313374+00:00 stderr F I0224 10:13:22.568194 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_kube-control-plane-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2028-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:13:22.56818573 +0000 UTC))"
2026-02-24T10:13:22.568313374+00:00 stderr F I0224 10:13:22.568207 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_node-system-admin-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:13:22.568198431 +0000 UTC))"
2026-02-24T10:13:22.568313374+00:00 stderr F I0224 10:13:22.568218 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-controller-manager-operator_csr-signer-signer@1771927938\" [] issuer=\"\" (2026-02-24 10:12:18 +0000 UTC to 2028-02-24 10:12:19 +0000 UTC (now=2026-02-24 10:13:22.568210791 +0000 UTC))"
2026-02-24T10:13:22.568313374+00:00 stderr F I0224 10:13:22.568230 1 tlsconfig.go:181] "Loaded client CA" index=8 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer-custom\" [] issuer=\"\" (2026-02-24 10:13:16 +0000 UTC to 2036-02-22 10:13:16 +0000 UTC (now=2026-02-24 10:13:22.568223231 +0000 UTC))"
2026-02-24T10:13:22.568313374+00:00 stderr F I0224 10:13:22.568247 1 tlsconfig.go:181] "Loaded client CA" index=9 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"openshift-kube-apiserver-operator_aggregator-client-signer@1771927736\" [] issuer=\"\" (2026-02-24 10:08:55 +0000 UTC to 2027-02-24 10:08:56 +0000 UTC (now=2026-02-24 10:13:22.568239482 +0000 UTC))"
2026-02-24T10:13:22.568382976+00:00 stderr F I0224 10:13:22.568375 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/var/run/secrets/serving-cert/tls.crt::/var/run/secrets/serving-cert/tls.key" certDetail="\"metrics.openshift-authentication-operator.svc\" [serving] validServingFor=[metrics.openshift-authentication-operator.svc,metrics.openshift-authentication-operator.svc.cluster.local] issuer=\"openshift-service-serving-signer@1740288168\" (2025-02-23 05:22:51 +0000 UTC to 2027-02-23 05:22:52 +0000 UTC (now=2026-02-24 10:13:22.568363495 +0000 UTC))"
2026-02-24T10:13:22.568793237+00:00 stderr F I0224 10:13:22.568463 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771927933\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771927933\" (2026-02-24 09:12:12 +0000 UTC to 2027-02-24 09:12:12 +0000 UTC (now=2026-02-24 10:13:22.568452728 +0000 UTC))"
2026-02-24T10:13:22.943031674+00:00 stderr F E0224 10:13:22.942333 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:28.292321830+00:00 stderr F E0224 10:13:28.291769 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:30.862208684+00:00 stderr F E0224 10:13:30.862140 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:31.420467651+00:00 stderr F E0224 10:13:31.420408 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:42.183673585+00:00 stderr F W0224 10:13:42.183003 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerDeploymentDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:42.183673585+00:00 stderr F W0224 10:13:42.183407 1 dynamic_operator_client.go:352] .status.conditions["OAuthServerWorkloadDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:42.183673585+00:00 stderr F W0224 10:13:42.183415 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerWorkloadDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:42.255741105+00:00 stderr F I0224 10:13:42.255680 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:42.300390373+00:00 stderr F E0224 10:13:42.270620 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:42.313365497+00:00 stderr F I0224 10:13:42.313311 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Progressing message changed from "OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: observed generation is 7, desired generation is 8." to "OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available",Available message changed from "OAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF" to "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:42.325928040+00:00 stderr F E0224 10:13:42.325016 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:42.348932783+00:00 stderr F E0224 10:13:42.347182 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:42.360932630+00:00 stderr F I0224 10:13:42.349625 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:42.360932630+00:00 stderr F E0224 10:13:42.360147 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:42.365936374+00:00 stderr F E0224 10:13:42.364074 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:42.370946518+00:00 stderr F I0224 10:13:42.370821 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF" to "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:13:42.372198125+00:00 stderr F E0224 10:13:42.372142 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:13:42.394343874+00:00 stderr F E0224 10:13:42.394294 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:13:42.395970511+00:00 stderr F I0224 10:13:42.395946 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:42.400025008+00:00 stderr F E0224 10:13:42.397748 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointsEndpointAccessibleController reconciliation failed: oauth service endpoints are not ready"
2026-02-24T10:13:42.402513360+00:00 stderr F E0224 10:13:42.402477 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:13:42.406051801+00:00 stderr F I0224 10:13:42.404535 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF" to "OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:42.411974592+00:00 stderr F E0224 10:13:42.410007 1 base_controller.go:279] "Unhandled Error" err="OAuthServerRouteEndpointAccessibleController reconciliation failed: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:42.413026722+00:00 stderr F E0224 10:13:42.412629 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:13:42.461056818+00:00 stderr F E0224 10:13:42.461000 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:13:42.549392617+00:00 stderr F E0224 10:13:42.549338 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:13:42.716453667+00:00 stderr F E0224 10:13:42.716397 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:13:43.048498047+00:00 stderr F E0224 10:13:43.048187 1 base_controller.go:279] "Unhandled Error" err="OAuthServerServiceEndpointAccessibleController reconciliation failed: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused"
2026-02-24T10:13:43.368685425+00:00 stderr F W0224 10:13:43.368632 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:43.406231148+00:00 stderr F I0224 10:13:43.406178 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable::OAuthServerServiceEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:43.409388769+00:00 stderr F I0224 10:13:43.409345 1 request.go:700] Waited for 1.073687488s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift
2026-02-24T10:13:43.416329710+00:00 stderr F I0224 10:13:43.416274 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF" to "OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:43.419641465+00:00 stderr F W0224 10:13:43.419097 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerServiceEndpointAccessibleControllerAvailable"].message is missing; this will eventually be fatal
2026-02-24T10:13:43.428064888+00:00 stderr F W0224 10:13:43.427990 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerRouteEndpointAccessibleControllerAvailable"].message is missing; this will eventually be fatal
2026-02-24T10:13:43.459974799+00:00 stderr F W0224 10:13:43.447047 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerServiceEndpointAccessibleControllerDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:43.459974799+00:00 stderr F I0224 10:13:43.450058 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:43.465941281+00:00 stderr F I0224 10:13:43.462575 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF\nOAuthServerServiceEndpointAccessibleControllerAvailable: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused" to "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:43.488388048+00:00 stderr F I0224 10:13:43.487922 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"OAuthServerDeployment_NoPod::OAuthServerRouteEndpointAccessibleController_EndpointUnavailable","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:43.495332379+00:00 stderr F I0224 10:13:43.494211 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "OAuthServerServiceEndpointAccessibleControllerDegraded: Get \"https://10.217.4.222:443/healthz\": dial tcp 10.217.4.222:443: connect: connection refused\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF" to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF"
2026-02-24T10:13:43.505171362+00:00 stderr F W0224 10:13:43.504405 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerRouteEndpointAccessibleControllerDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:43.508923131+00:00 stderr F I0224 10:13:43.508121 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:43.519115275+00:00 stderr F I0224 10:13:43.518744 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nOAuthServerRouteEndpointAccessibleControllerAvailable: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF" to "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node."
2026-02-24T10:13:43.540541933+00:00 stderr F I0224 10:13:43.540094 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:43.551104778+00:00 stderr F I0224 10:13:43.551023 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \"https://oauth-openshift.apps-crc.testing/healthz\": EOF" to "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server"
2026-02-24T10:13:44.609872255+00:00 stderr F I0224 10:13:44.609809 1 request.go:700] Waited for 1.599045985s due to client-side throttling, not priority and fairness, request: POST:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events
2026-02-24T10:13:44.825020802+00:00 stderr F W0224 10:13:44.824956 1 dynamic_operator_client.go:352] .status.conditions["WellKnownReadyControllerProgressing"].reason is missing; this will eventually be fatal
2026-02-24T10:13:44.825020802+00:00 stderr F W0224 10:13:44.824981 1 dynamic_operator_client.go:355] .status.conditions["WellKnownReadyControllerProgressing"].message is missing; this will eventually be fatal
2026-02-24T10:13:44.876981891+00:00 stderr F I0224 10:13:44.876931 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:44.877430114+00:00 stderr F W0224 10:13:44.877399 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:44.879140823+00:00 stderr F E0224 10:13:44.879109 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:44.879140823+00:00 stderr F E0224 10:13:44.878093 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:44.888463242+00:00 stderr F I0224 10:13:44.888417 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:44.889238355+00:00 stderr F E0224 10:13:44.889209 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:44.894973651+00:00 stderr F W0224 10:13:44.894939 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:44.894993061+00:00 stderr F E0224 10:13:44.894982 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:44.902048645+00:00 stderr F I0224 10:13:44.902009 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:44.902763955+00:00 stderr F E0224 10:13:44.902737 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:44.915930895+00:00 stderr F W0224 10:13:44.915653 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:44.915930895+00:00 stderr F E0224 10:13:44.915712 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:44.925198352+00:00 stderr F I0224 10:13:44.925150 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:44.926271903+00:00 stderr F E0224 10:13:44.926246 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:44.936976462+00:00 stderr F W0224 10:13:44.936927 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:44.936976462+00:00 stderr F W0224 10:13:44.936947 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:44.939903997+00:00 stderr F E0224 10:13:44.939841 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:44.943961494+00:00 stderr F W0224 10:13:44.943927 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:44.943982205+00:00 stderr F E0224 10:13:44.943973 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:44.949953077+00:00 stderr F W0224 10:13:44.949902 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:44.949953077+00:00 stderr F W0224 10:13:44.949919 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:44.951089670+00:00 stderr F E0224 10:13:44.951045 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:44.966534945+00:00 stderr F W0224 10:13:44.966473 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:44.966534945+00:00 stderr F W0224 10:13:44.966494 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:44.967365408+00:00 stderr F E0224 10:13:44.967327 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:44.969270374+00:00 stderr F I0224 10:13:44.969237 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:44.969970674+00:00 stderr F E0224 10:13:44.969940 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:44.990385573+00:00 stderr F W0224 10:13:44.990344 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:44.990413784+00:00 stderr F E0224 10:13:44.990383 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:44.992426422+00:00 stderr F W0224 10:13:44.992385 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:44.992426422+00:00 stderr F W0224 10:13:44.992401 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:44.992963898+00:00 stderr F E0224 10:13:44.992938 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:45.011048210+00:00 stderr F W0224 10:13:45.010996 1 dynamic_operator_client.go:352] .status.conditions["IngressStateEndpointsDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:45.011048210+00:00 stderr F W0224 10:13:45.011017 1 dynamic_operator_client.go:355] .status.conditions["IngressStateEndpointsDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:45.026117464+00:00 stderr F E0224 10:13:45.026076 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-IngressState\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-IngressState&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:45.037417661+00:00 stderr F W0224 10:13:45.037385 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:45.037417661+00:00 stderr F W0224 10:13:45.037400 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:45.051852437+00:00 stderr F I0224 10:13:45.051820 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:45.053032841+00:00 stderr F E0224 10:13:45.053009 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:45.215154938+00:00 stderr F I0224 10:13:45.215102 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:45.215827468+00:00 stderr F E0224 10:13:45.215785 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:45.226034112+00:00 stderr F E0224 10:13:45.225993 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:45.338028963+00:00 stderr F W0224 10:13:45.337970 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:45.338028963+00:00 stderr F W0224 10:13:45.337996 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:45.427508985+00:00 stderr F W0224 10:13:45.427182 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:45.427556866+00:00 stderr F E0224 10:13:45.427513 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:45.537951501+00:00 stderr F I0224 10:13:45.537877 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:45.538995312+00:00 stderr F E0224 10:13:45.538964 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:45.626500126+00:00 stderr F E0224 10:13:45.626427 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:45.807430536+00:00 stderr F I0224 10:13:45.807371 1 request.go:700] Waited for 1.589339205s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/secrets/etcd-client
2026-02-24T10:13:45.826692332+00:00 stderr F E0224 10:13:45.826631 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:45.995180803+00:00 stderr F W0224 10:13:45.994744 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:45.995180803+00:00 stderr F W0224 10:13:45.995155 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:46.026935829+00:00 stderr F E0224 10:13:46.026844 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:13:46.182123496+00:00 stderr F I0224 10:13:46.182060 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:46.183496886+00:00 stderr F E0224 10:13:46.183424 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:46.208939820+00:00 stderr F E0224 10:13:46.208851 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events\": dial tcp 10.217.4.1:443: connect: connection refused" event="&Event{ObjectMeta:{authentication-operator.18972725f6fb2caf openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps-crc.testing/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://10.217.4.222:443/healthz\\\": dial tcp 10.217.4.222:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps-crc.testing/healthz\\\": EOF\",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-02-24 10:13:42.404508847 +0000 UTC m=+90.420818245,LastTimestamp:2026-02-24 10:13:42.404508847 +0000 UTC m=+90.420818245,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}"
2026-02-24T10:13:46.226762634+00:00 stderr F W0224 10:13:46.226694 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:46.226798525+00:00 stderr F E0224 10:13:46.226774 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:46.441567152+00:00 stderr F E0224 10:13:46.441063 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:46.609712723+00:00 stderr F E0224 10:13:46.609643 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:46.626409764+00:00 stderr F E0224 10:13:46.626360 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:46.813451011+00:00 stderr F W0224 10:13:46.813381 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:46.813451011+00:00 stderr F W0224 10:13:46.813417 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:46.813451011+00:00 stderr F W0224 10:13:46.813428 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:46.813451011+00:00 stderr F W0224 10:13:46.813438 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:46.813451011+00:00 stderr F W0224 10:13:46.813445 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:46.813501763+00:00 stderr F W0224 10:13:46.813451 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:46.813501763+00:00 stderr F W0224 10:13:46.813458 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:46.813501763+00:00 stderr F W0224 10:13:46.813466 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:46.827241559+00:00 stderr F W0224 10:13:46.827166 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:46.827241559+00:00 stderr F E0224 10:13:46.827214 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/secrets/v4-0-config-system-router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:46.954400138+00:00 stderr F W0224 10:13:46.954330 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:46.954400138+00:00 stderr F W0224 10:13:46.954348 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:47.008979943+00:00 stderr F I0224 10:13:47.008237 1 request.go:700] Waited for 1.380066547s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/audit
2026-02-24T10:13:47.026151198+00:00 stderr F W0224 10:13:47.026093 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:47.026172459+00:00 stderr F E0224 10:13:47.026156 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:47.228980830+00:00 stderr F E0224 10:13:47.228480 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:47.426930231+00:00 stderr F E0224 10:13:47.426834 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:47.466850523+00:00 stderr F I0224 10:13:47.466769 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:47.468522241+00:00 stderr F E0224 10:13:47.468434 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:47.626984123+00:00 stderr F E0224 10:13:47.626810 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:47.809803968+00:00 stderr F E0224 10:13:47.809720 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:47.827112177+00:00 stderr F E0224 10:13:47.827064 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:13:48.026439107+00:00 stderr F E0224 10:13:48.026376 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:48.073080504+00:00 stderr F W0224 10:13:48.073010 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:48.073080504+00:00 stderr F W0224 10:13:48.073030 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:48.225758349+00:00 stderr F W0224 10:13:48.225698 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:48.225808210+00:00 stderr F E0224 10:13:48.225751 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:48.407671717+00:00 stderr F I0224 10:13:48.407619 1 request.go:700] Waited for 1.143611865s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift
2026-02-24T10:13:48.427271843+00:00 stderr F W0224 10:13:48.426603 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:48.427271843+00:00 stderr F E0224 10:13:48.426651 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:48.627128098+00:00 stderr F E0224 10:13:48.627052 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:48.809648985+00:00 stderr F E0224 10:13:48.809555 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:48.827212501+00:00 stderr F E0224 10:13:48.827127 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:49.214333061+00:00 stderr F E0224 10:13:49.214223 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:49.408039879+00:00 stderr F I0224 10:13:49.407932 1 request.go:700] Waited for 1.199144807s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/secrets/v4-0-config-system-session
2026-02-24T10:13:49.414037352+00:00 stderr F W0224 10:13:49.413939 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:49.414037352+00:00 stderr F W0224 10:13:49.413978 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:49.414037352+00:00 stderr F W0224 10:13:49.413998 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:49.414037352+00:00 stderr F W0224 10:13:49.414009 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:49.414037352+00:00 stderr F W0224 10:13:49.414019 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:49.414037352+00:00 stderr F W0224 10:13:49.414029 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:49.414091113+00:00 stderr F W0224 10:13:49.414038 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:49.414091113+00:00 stderr F W0224 10:13:49.414051 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:49.415624817+00:00 stderr F E0224 10:13:49.415517 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:49.513311146+00:00 stderr F W0224 10:13:49.513210 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:49.513380948+00:00 stderr F E0224 10:13:49.513317 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:49.627192082+00:00 stderr F E0224 10:13:49.627100 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:13:49.826517753+00:00 stderr F W0224 10:13:49.826372 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:49.826727069+00:00 stderr F E0224 10:13:49.826667 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:49.914220413+00:00 stderr F W0224 10:13:49.914112 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:49.914220413+00:00 stderr F W0224 10:13:49.914142 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:50.009363459+00:00 stderr F E0224 10:13:50.009277 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:50.027029748+00:00 stderr F E0224 10:13:50.026769 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:50.031913259+00:00 stderr F I0224 10:13:50.031837 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:50.033597157+00:00 stderr F E0224 10:13:50.033544 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:50.226424501+00:00 stderr F E0224 10:13:50.226346 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:50.608234466+00:00 stderr F I0224 10:13:50.608148 1 request.go:700] Waited for 1.388585793s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/secrets/etcd-client
2026-02-24T10:13:50.613965071+00:00 stderr F E0224 10:13:50.613914 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:51.209165794+00:00 stderr F E0224 10:13:51.208758 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events\": dial tcp 10.217.4.1:443: connect: connection refused" event="&Event{ObjectMeta:{authentication-operator.18972725f6fb2caf openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps-crc.testing/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://10.217.4.222:443/healthz\\\": dial tcp 10.217.4.222:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps-crc.testing/healthz\\\": EOF\",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-02-24 10:13:42.404508847 +0000 UTC m=+90.420818245,LastTimestamp:2026-02-24 10:13:42.404508847 +0000 UTC m=+90.420818245,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}"
2026-02-24T10:13:51.412128010+00:00 stderr F W0224 10:13:51.412023 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:51.412128010+00:00 stderr F E0224 10:13:51.412079 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:51.609129624+00:00 stderr F E0224 10:13:51.609053 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:51.808052113+00:00 stderr F I0224 10:13:51.807994 1 request.go:700] Waited for 1.579255864s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/audit
2026-02-24T10:13:51.815595691+00:00 stderr F E0224 10:13:51.815539 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:52.018944248+00:00 stderr F E0224 10:13:52.018837 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:13:52.082404808+00:00 stderr F W0224 10:13:52.081978 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:52.082404808+00:00 stderr F E0224 10:13:52.082336 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:52.219988588+00:00 stderr F E0224 10:13:52.219857 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:52.414535471+00:00 stderr F W0224 10:13:52.414432 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:52.414535471+00:00 stderr F W0224 10:13:52.414470 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:52.414535471+00:00 stderr F W0224 10:13:52.414479 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:52.414535471+00:00 stderr F W0224 10:13:52.414486 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:52.414535471+00:00 stderr F W0224 10:13:52.414494 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:52.414535471+00:00 stderr F W0224 10:13:52.414502 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:52.414535471+00:00 stderr F W0224 10:13:52.414508 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:52.414535471+00:00 stderr F W0224 10:13:52.414515 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:52.415999043+00:00 stderr F E0224 10:13:52.415936 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:52.593848714+00:00 stderr F W0224 10:13:52.593780 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:52.593848714+00:00 stderr F W0224 10:13:52.593808 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:52.594565385+00:00 stderr F E0224 10:13:52.594537 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:52.811416442+00:00 stderr F W0224 10:13:52.811354 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:52.811484344+00:00 stderr F E0224 10:13:52.811461 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:53.007581601+00:00 stderr F I0224 10:13:53.007513 1 request.go:700] Waited for 1.397063768s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift
2026-02-24T10:13:53.009326631+00:00 stderr F E0224 10:13:53.009264 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:53.212247386+00:00 stderr F E0224 10:13:53.212156 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:53.615766768+00:00 stderr F E0224 10:13:53.615704 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:54.007744177+00:00 stderr F I0224 10:13:54.007671 1 request.go:700] Waited for 1.398135648s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift
2026-02-24T10:13:54.016954663+00:00 stderr F E0224 10:13:54.016871 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:13:54.214517913+00:00 stderr F W0224 10:13:54.214448 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:54.214564985+00:00 stderr F E0224 10:13:54.214514 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:54.409152769+00:00 stderr F E0224 10:13:54.409072 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:54.614381679+00:00 stderr F E0224 10:13:54.614298 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:54.939863171+00:00 stderr F W0224 10:13:54.939783 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:54.939863171+00:00 stderr F W0224 10:13:54.939817 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:54.940865050+00:00 stderr F E0224 10:13:54.940789 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:55.008170761+00:00 stderr F I0224 10:13:55.007968 1 request.go:700] Waited for 1.389403777s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/secrets/etcd-client
2026-02-24T10:13:55.013252137+00:00 stderr F E0224 10:13:55.013137 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:55.157107958+00:00 stderr F I0224 10:13:55.157032 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:13:55.158293962+00:00 stderr F E0224 10:13:55.158248 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:55.210690564+00:00 stderr F W0224 10:13:55.210629 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:55.210690564+00:00 stderr F W0224 10:13:55.210643 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:55.210690564+00:00 stderr F W0224 10:13:55.210648 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:55.210690564+00:00 stderr F W0224 10:13:55.210652 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:55.210690564+00:00 stderr F W0224 10:13:55.210656 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:55.210690564+00:00 stderr F W0224 10:13:55.210659 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:55.210690564+00:00 stderr F W0224 10:13:55.210662 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:55.210690564+00:00 stderr F W0224 10:13:55.210666 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:55.211755225+00:00 stderr F E0224 10:13:55.211702 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:55.613427564+00:00 stderr F W0224 10:13:55.613357 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:55.613427564+00:00 stderr F E0224 10:13:55.613407 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:55.809403568+00:00 stderr F E0224 10:13:55.809312 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:56.008114561+00:00 stderr F I0224 10:13:56.008057 1 request.go:700] Waited for 1.391395154s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/configmaps/audit
2026-02-24T10:13:56.014344750+00:00 stderr F E0224 10:13:56.014284 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:56.213477746+00:00 stderr F E0224 10:13:56.213406 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:13:56.411831669+00:00 stderr F E0224 10:13:56.411762 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:57.008279107+00:00 stderr F I0224 10:13:57.008200 1 request.go:700] Waited for 1.392295499s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs
2026-02-24T10:13:57.014400694+00:00 stderr F W0224 10:13:57.014320 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:57.014400694+00:00 stderr F E0224 10:13:57.014382 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:57.209058840+00:00 stderr F E0224 10:13:57.208973 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:57.209207215+00:00 stderr F W0224 10:13:57.208978 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:57.209321138+00:00 stderr F E0224 10:13:57.209295 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:13:57.413884740+00:00 stderr F E0224 10:13:57.413807 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:57.723532013+00:00 stderr F W0224 10:13:57.723210 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:57.723639146+00:00 stderr F W0224 10:13:57.723618 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:57.724953324+00:00 stderr F E0224 10:13:57.724875 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:57.812554862+00:00 stderr F E0224 10:13:57.812509 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:58.008374212+00:00 stderr F I0224 10:13:58.008257 1 request.go:700] Waited for 1.399350303s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/secrets/v4-0-config-system-session
2026-02-24T10:13:58.012267964+00:00 stderr F W0224 10:13:58.012199 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:58.012267964+00:00 stderr F W0224 10:13:58.012224 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:58.012267964+00:00 stderr F W0224 10:13:58.012231 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:58.012267964+00:00 stderr F W0224 10:13:58.012236 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:58.012267964+00:00 stderr F W0224 10:13:58.012242 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:58.012267964+00:00 stderr F W0224 10:13:58.012247 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:58.012267964+00:00 stderr F W0224 10:13:58.012251 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:13:58.012267964+00:00 stderr F W0224 10:13:58.012256 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:13:58.013322704+00:00 stderr F E0224 10:13:58.013292 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:58.214999033+00:00 stderr F E0224 10:13:58.214590 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:13:58.414738856+00:00 stderr F W0224 10:13:58.414648 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:58.414738856+00:00 stderr F E0224 10:13:58.414699 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:58.608942498+00:00 stderr F E0224 10:13:58.608868 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:58.813116319+00:00 stderr F E0224 10:13:58.813051 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:59.207458077+00:00 stderr F I0224 10:13:59.207303 1 request.go:700] Waited for 1.391719423s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/secrets/etcd-client
2026-02-24T10:13:59.215123007+00:00 stderr F E0224 10:13:59.215032 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:13:59.812743840+00:00 stderr F W0224 10:13:59.812683 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:13:59.812743840+00:00 stderr F E0224 10:13:59.812721 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:00.013331077+00:00 stderr F E0224 10:14:00.013253 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:00.207626333+00:00 stderr F I0224 10:14:00.207547 1 request.go:700] Waited for 1.197575431s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa
2026-02-24T10:14:00.215751687+00:00 stderr F E0224 10:14:00.215701 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:00.412256666+00:00 stderr F E0224 10:14:00.412194 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:00.612534305+00:00 stderr F W0224 10:14:00.612464 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:00.612534305+00:00 stderr F W0224 10:14:00.612492 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:00.612534305+00:00 stderr F W0224 10:14:00.612500 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:00.612534305+00:00 stderr F W0224 10:14:00.612507 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:00.612534305+00:00 stderr F W0224 10:14:00.612513 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:00.612534305+00:00 stderr F W0224 10:14:00.612519 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:00.612534305+00:00 stderr F W0224 10:14:00.612524 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:00.612571276+00:00 stderr F W0224 10:14:00.612530 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:00.613600436+00:00 stderr F E0224 10:14:00.613570 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:01.009385855+00:00 stderr F E0224 10:14:01.008997 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:01.207927493+00:00 stderr F I0224 10:14:01.207862 1 request.go:700] Waited for 1.393784423s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs
2026-02-24T10:14:01.211729482+00:00 stderr F W0224 10:14:01.211683 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:01.211748233+00:00 stderr F E0224 10:14:01.211729 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:01.814871311+00:00 stderr F E0224 10:14:01.813880 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:02.009176021+00:00 stderr F E0224 10:14:02.009131 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events\": dial tcp 10.217.4.1:443: connect: connection refused" event="&Event{ObjectMeta:{authentication-operator.18972725f6fb2caf openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps-crc.testing/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://10.217.4.222:443/healthz\\\": dial tcp 10.217.4.222:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps-crc.testing/healthz\\\": EOF\",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-02-24 10:13:42.404508847 +0000 UTC m=+90.420818245,LastTimestamp:2026-02-24 10:13:42.404508847 +0000 UTC m=+90.420818245,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}"
2026-02-24T10:14:02.211284573+00:00 stderr F E0224 10:14:02.211205 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:02.609006292+00:00 stderr F I0224 10:14:02.608952 1 request.go:700] Waited for 1.000172333s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/secrets/v4-0-config-system-session
2026-02-24T10:14:02.611898155+00:00 stderr F W0224 10:14:02.611838 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:02.611924566+00:00 stderr F W0224 10:14:02.611917 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:02.611934086+00:00 stderr F W0224 10:14:02.611923 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:02.611934086+00:00 stderr F W0224 10:14:02.611929 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:02.611943186+00:00 stderr F W0224 10:14:02.611933 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:02.611943186+00:00 stderr F W0224 10:14:02.611938 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:02.611952066+00:00 stderr F W0224 10:14:02.611943 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:02.611952066+00:00 stderr F W0224 10:14:02.611946 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:02.612719239+00:00 stderr F E0224 10:14:02.612679 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:02.810944801+00:00 stderr F E0224 10:14:02.810874 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:03.220717284+00:00 stderr F W0224 10:14:03.220369 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:03.220717284+00:00 stderr F E0224 10:14:03.220426 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:03.416703721+00:00 stderr F E0224 10:14:03.416647 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:04.215553658+00:00 stderr F W0224 10:14:04.214536 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:04.215553658+00:00 stderr F W0224 10:14:04.215499 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:04.215553658+00:00 stderr F W0224 10:14:04.215507 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:04.215553658+00:00 stderr F W0224 10:14:04.215513 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:04.215553658+00:00 stderr F W0224 10:14:04.215519 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:04.215553658+00:00 stderr F W0224 10:14:04.215524 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:04.215553658+00:00 stderr F W0224 10:14:04.215528 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:04.215553658+00:00 stderr F W0224 10:14:04.215532 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:04.216773893+00:00 stderr F E0224 10:14:04.216714 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:04.411708290+00:00 stderr F E0224 10:14:04.411667 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:04.616598242+00:00 stderr F E0224 10:14:04.616557 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:04.937727020+00:00 stderr F W0224 10:14:04.937676 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:04.937796752+00:00 stderr F W0224 10:14:04.937786 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:04.938587674+00:00 stderr F E0224 10:14:04.938552 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:05.216317641+00:00 stderr F W0224 10:14:05.216223 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:05.216317641+00:00 stderr F W0224 10:14:05.216278 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:05.217797603+00:00 stderr F E0224 10:14:05.217746 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:05.400982934+00:00 stderr F I0224 10:14:05.400817 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:14:05.402278291+00:00 stderr F E0224 10:14:05.402205 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:05.618057304+00:00 stderr F E0224 10:14:05.617995 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:05.811619563+00:00 stderr F W0224 10:14:05.811555 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:05.811619563+00:00 stderr F W0224 10:14:05.811578 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:05.811619563+00:00 stderr F W0224 10:14:05.811582 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:05.811619563+00:00 stderr F W0224 10:14:05.811586 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:05.811619563+00:00 stderr F W0224 10:14:05.811589 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:05.811619563+00:00 stderr F W0224 10:14:05.811593 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:05.811619563+00:00 stderr F W0224 10:14:05.811596 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:05.811619563+00:00 stderr F W0224 10:14:05.811599 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:05.812861449+00:00 stderr F E0224 10:14:05.812815 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:06.011510821+00:00 stderr F W0224 10:14:06.011437 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:06.011510821+00:00 stderr F W0224 10:14:06.011465 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:06.012467449+00:00 stderr F E0224 10:14:06.012411 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:06.811395028+00:00 stderr F W0224 10:14:06.811311 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:06.811395028+00:00 stderr F W0224 10:14:06.811335 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:06.812397636+00:00 stderr F E0224 10:14:06.812360 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:07.015983371+00:00 stderr F E0224 10:14:07.015936 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:07.414569495+00:00 stderr F W0224 10:14:07.414382 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:07.414569495+00:00 stderr F W0224 10:14:07.414436 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:07.414569495+00:00 stderr F W0224 10:14:07.414449 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:07.414569495+00:00 stderr F W0224 10:14:07.414460 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:07.414569495+00:00 stderr F W0224 10:14:07.414472 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:07.414569495+00:00 stderr F W0224 10:14:07.414482 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:07.414569495+00:00 stderr F W0224 10:14:07.414493 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:07.414569495+00:00 stderr F W0224 10:14:07.414501 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:07.416145720+00:00 stderr F E0224 10:14:07.416095 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:07.460035296+00:00 stderr F W0224 10:14:07.459978 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:07.460170949+00:00 stderr F E0224 10:14:07.460143 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:14:07.614824935+00:00 stderr F W0224 10:14:07.614746 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:07.614970169+00:00 stderr F W0224 10:14:07.614943 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:07.620306131+00:00 stderr F E0224 10:14:07.620234 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:08.014564241+00:00 stderr F E0224 10:14:08.014462 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:08.411362654+00:00 stderr F W0224 10:14:08.411311 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:08.411362654+00:00 stderr F W0224 10:14:08.411332 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:08.411962481+00:00 stderr F E0224 10:14:08.411941 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:09.012673488+00:00 stderr F W0224 10:14:09.012335 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:09.012673488+00:00 stderr F W0224 10:14:09.012628 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:09.012673488+00:00 stderr F W0224 10:14:09.012633 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:09.012673488+00:00 stderr F W0224 10:14:09.012636 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:09.012673488+00:00 stderr F W0224 10:14:09.012640 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:09.012673488+00:00 stderr F W0224 10:14:09.012644 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:09.012673488+00:00 stderr F W0224 10:14:09.012646 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:09.012673488+00:00 stderr F W0224 10:14:09.012650 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:09.013671387+00:00 stderr F E0224 10:14:09.013632 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:09.213610387+00:00 stderr F W0224 10:14:09.213441 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:09.213610387+00:00 stderr F W0224 10:14:09.213478 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:09.214503283+00:00 stderr F E0224 10:14:09.214440 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:09.409296236+00:00 stderr F E0224 10:14:09.409239 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:09.616843544+00:00 stderr F E0224 10:14:09.616165 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:10.011339341+00:00 stderr F W0224 10:14:10.011273 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:10.011339341+00:00 stderr F W0224 10:14:10.011296 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:10.013318488+00:00 stderr F E0224 10:14:10.013012 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:10.209671306+00:00 stderr F E0224 10:14:10.209557 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:10.614764126+00:00 stderr F E0224 10:14:10.614705 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:11.013244467+00:00 stderr F E0224 10:14:11.013117 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:11.212800256+00:00 stderr F W0224 10:14:11.212584 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:11.212800256+00:00 stderr F W0224 10:14:11.212610 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:11.221299209+00:00 stderr F E0224 10:14:11.221200 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:11.812675819+00:00 stderr F W0224 10:14:11.812610 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:11.812675819+00:00 stderr F W0224 10:14:11.812636 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:11.812675819+00:00 stderr F W0224 10:14:11.812640 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:11.812675819+00:00 stderr F W0224 10:14:11.812645 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:11.812675819+00:00 stderr F W0224 10:14:11.812650 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:11.812675819+00:00 stderr F W0224 10:14:11.812654 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:11.812675819+00:00 stderr F W0224 10:14:11.812658 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:11.812675819+00:00 stderr F W0224 10:14:11.812662 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:11.813578845+00:00 stderr F E0224 10:14:11.813537 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:12.013526275+00:00 stderr F E0224 10:14:12.013454 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:12.209158893+00:00 stderr F E0224 10:14:12.209095 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-IngressState reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/endpoints/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:12.416736592+00:00 stderr F E0224 10:14:12.416658 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:12.811534968+00:00 stderr F W0224 10:14:12.811392 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:12.811534968+00:00 stderr F W0224 10:14:12.811422 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:12.812782533+00:00 stderr F E0224 10:14:12.812723 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:13.010518350+00:00 stderr F E0224 10:14:13.010440 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events\": dial tcp 10.217.4.1:443: connect: connection refused" event="&Event{ObjectMeta:{authentication-operator.18972725f6fb2caf openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps-crc.testing/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://10.217.4.222:443/healthz\\\": dial tcp 10.217.4.222:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps-crc.testing/healthz\\\": EOF\",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-02-24 10:13:42.404508847 +0000 UTC m=+90.420818245,LastTimestamp:2026-02-24 10:13:42.404508847 +0000 UTC m=+90.420818245,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}"
2026-02-24T10:14:13.208320340+00:00 stderr F I0224 10:14:13.208201 1 request.go:700] Waited for 1.152701019s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert
2026-02-24T10:14:13.210021839+00:00 stderr F E0224 10:14:13.209950 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:13.375822582+00:00 stderr F E0224 10:14:13.375700 1 leaderelection.go:429] Failed to update lock optimitically: Put "https://10.217.4.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock?timeout=4m0s": dial tcp 10.217.4.1:443: connect: connection refused, falling back to slow path
2026-02-24T10:14:13.376713648+00:00 stderr F E0224 10:14:13.376640 1 leaderelection.go:436] error retrieving resource lock openshift-authentication-operator/cluster-authentication-operator-lock: Get "https://10.217.4.1:443/apis/coordination.k8s.io/v1/namespaces/openshift-authentication-operator/leases/cluster-authentication-operator-lock?timeout=4m0s": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:13.616456937+00:00 stderr F E0224 10:14:13.616328 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:13.817593862+00:00 stderr F I0224 10:14:13.817512 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:14:13.818420755+00:00 stderr F E0224 10:14:13.818337 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:13.818466537+00:00 stderr F E0224 10:14:13.818427 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:14.014286659+00:00 stderr F E0224 10:14:14.014213 1 base_controller.go:279] "Unhandled Error" err="OAuthAPIServerController-WorkloadWorkloadController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"OAuthAPIServerController-Workload\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OAuthAPIServerController-Workload&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:14.209205986+00:00 stderr F E0224 10:14:14.209145 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:14.411945257+00:00 stderr F W0224 10:14:14.411840 1 base_controller.go:242] Updating status of "RouterCertsDomainValidationController" failed: unable to ApplyStatus for operator using fieldManager "RouterCertsDomainValidationController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=RouterCertsDomainValidationController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:14.411945257+00:00 stderr F E0224 10:14:14.411880 1 base_controller.go:279] "Unhandled Error" err="RouterCertsDomainValidationController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/secrets/router-certs\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:14.608324645+00:00 stderr F I0224 10:14:14.608231 1 request.go:700] Waited for 1.14011312s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift
2026-02-24T10:14:14.813249669+00:00 stderr F E0224 10:14:14.813137 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:14.939736518+00:00 stderr F W0224 10:14:14.939615 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:14.939736518+00:00 stderr F W0224 10:14:14.939644 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:14.940882590+00:00 stderr F E0224 10:14:14.940790 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:14.999202209+00:00 stderr F W0224 10:14:14.999129 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:14.999258861+00:00 stderr F E0224 10:14:14.999210 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.012679044+00:00 stderr F W0224 10:14:15.012589 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:15.012739496+00:00 stderr F E0224 10:14:15.012671 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.030810113+00:00 stderr F W0224 10:14:15.030699 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:15.030810113+00:00 stderr F E0224 10:14:15.030757 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.058384452+00:00 stderr F W0224 10:14:15.058316 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:15.058384452+00:00 stderr F E0224 10:14:15.058357 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.106966023+00:00 stderr F W0224 10:14:15.106784 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:15.106966023+00:00 stderr F E0224 10:14:15.106848 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.193227900+00:00 stderr F W0224 10:14:15.193166 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:15.193227900+00:00 stderr F E0224 10:14:15.193199 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.210128714+00:00 stderr F W0224 10:14:15.210074 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:15.210153134+00:00 stderr F W0224 10:14:15.210127 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:15.213363937+00:00 stderr F E0224 10:14:15.212122 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.359068826+00:00 stderr F W0224 10:14:15.359001 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:15.359068826+00:00 stderr F E0224 10:14:15.359054 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.408458438+00:00 stderr F E0224 10:14:15.408392 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.610093037+00:00 stderr F E0224 10:14:15.609613 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.685921397+00:00 stderr F W0224 10:14:15.685837 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:15.685968568+00:00 stderr F E0224 10:14:15.685914 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:15.808089992+00:00 stderr F I0224 10:14:15.808010 1 request.go:700] Waited for 1.198254913s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift
2026-02-24T10:14:15.822646609+00:00 stderr F E0224 10:14:15.822551 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:16.209160327+00:00 stderr F E0224 10:14:16.209077 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:16.333788953+00:00 stderr F W0224 10:14:16.333432 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:16.333788953+00:00 stderr F E0224 10:14:16.333747 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:16.409213671+00:00 stderr F E0224 10:14:16.409125 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:16.819940472+00:00 stderr F E0224 10:14:16.819850 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:17.008296471+00:00 stderr F E0224 10:14:17.008219 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:17.609170743+00:00 stderr F E0224 10:14:17.609042 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:17.622470563+00:00 stderr F W0224 10:14:17.622374 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:17.622470563+00:00 stderr F E0224 10:14:17.622438 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:17.808682031+00:00 stderr F E0224 10:14:17.808631 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:18.020413609+00:00 stderr F E0224 10:14:18.020325 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:18.214238615+00:00 stderr F W0224 10:14:18.214134 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:18.214238615+00:00 stderr F W0224 10:14:18.214173 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:18.215529222+00:00 stderr F E0224 10:14:18.215451 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:18.408999277+00:00 stderr F E0224 10:14:18.408923 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:18.613245911+00:00 stderr F W0224 10:14:18.613081 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:18.613245911+00:00 stderr F W0224 10:14:18.613121 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:18.614581829+00:00 stderr F E0224 10:14:18.614517 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:19.020090860+00:00 stderr F E0224 10:14:19.019976 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:19.210684953+00:00 stderr F E0224 10:14:19.210622 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:19.608625250+00:00 stderr F E0224 10:14:19.608550 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:19.809536187+00:00 stderr F E0224 10:14:19.809322 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:20.190439555+00:00 stderr F W0224 10:14:20.190400 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:20.190549788+00:00 stderr F E0224 10:14:20.190537 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:20.213798604+00:00 stderr F E0224 10:14:20.213764 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:20.609024102+00:00 stderr F E0224 10:14:20.608966 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:21.029745779+00:00 stderr F E0224 10:14:21.029650 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:21.413075406+00:00 stderr F E0224 10:14:21.412796 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:21.608974571+00:00 stderr F E0224 10:14:21.608914 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:22.059249694+00:00 stderr F W0224 10:14:22.059194 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:22.059249694+00:00 stderr F W0224 10:14:22.059218 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:22.059249694+00:00 stderr F W0224 10:14:22.059224 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigIngressDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:22.059249694+00:00 stderr F W0224 10:14:22.059228 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigIngressDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:22.059249694+00:00 stderr F W0224 10:14:22.059233 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigRouteDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:22.059249694+00:00 stderr F W0224 10:14:22.059237 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigRouteDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:22.059249694+00:00 stderr F W0224 10:14:22.059242 1 dynamic_operator_client.go:352] .status.conditions["OAuthConfigServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:22.059322386+00:00 stderr F W0224 10:14:22.059245 1 dynamic_operator_client.go:355] .status.conditions["OAuthConfigServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:22.060242253+00:00 stderr F E0224 10:14:22.060215 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-PayloadConfig reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-PayloadConfig\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-PayloadConfig&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:22.208715641+00:00 stderr F E0224 10:14:22.208649 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:22.892405862+00:00 stderr F E0224 10:14:22.892014 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:23.012102206+00:00 stderr F E0224 10:14:23.012040 1 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication-operator/events\": dial tcp 10.217.4.1:443: connect: connection refused" event="&Event{ObjectMeta:{authentication-operator.18972725f6fb2caf openshift-authentication-operator 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Deployment,Namespace:openshift-authentication-operator,Name:authentication-operator,UID:,APIVersion:,ResourceVersion:,FieldPath:,},Reason:OperatorStatusChanged,Message:Status for clusteroperator/authentication changed: Degraded message changed from \"OAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps-crc.testing/healthz\\\": EOF\" to \"OAuthServerServiceEndpointAccessibleControllerDegraded: Get \\\"https://10.217.4.222:443/healthz\\\": dial tcp 10.217.4.222:443: connect: connection refused\\nOAuthServerServiceEndpointsEndpointAccessibleControllerDegraded: oauth service endpoints are not ready\\nIngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server\\nOAuthServerRouteEndpointAccessibleControllerDegraded: Get \\\"https://oauth-openshift.apps-crc.testing/healthz\\\": EOF\",Source:EventSource{Component:oauth-apiserver-status-controller-statussyncer_authentication,Host:,},FirstTimestamp:2026-02-24 10:13:42.404508847 +0000 UTC m=+90.420818245,LastTimestamp:2026-02-24 10:13:42.404508847 +0000 UTC m=+90.420818245,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:oauth-apiserver-status-controller-statussyncer_authentication,ReportingInstance:,}"
2026-02-24T10:14:23.738324674+00:00 stderr F E0224 10:14:23.738255 1 base_controller.go:279] "Unhandled Error" err="auditPolicyController reconciliation failed: unable to ApplyStatus for operator using fieldManager \"oauth-apiserver-AuditPolicy\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=oauth-apiserver-AuditPolicy&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:23.740906278+00:00 stderr F W0224 10:14:23.740840 1 dynamic_operator_client.go:352] .status.conditions["OAuthServiceDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:23.740906278+00:00 stderr F W0224 10:14:23.740867 1 dynamic_operator_client.go:355] .status.conditions["OAuthServiceDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:23.741743472+00:00 stderr F E0224 10:14:23.741713 1 base_controller.go:279] "Unhandled Error" err="openshift-authentication-ServiceCA reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-authentication-ServiceCA\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-authentication-ServiceCA&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:24.940953813+00:00 stderr F W0224 10:14:24.940790 1 dynamic_operator_client.go:352] .status.conditions["APIServicesDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:24.940953813+00:00 stderr F W0224 10:14:24.940833 1 dynamic_operator_client.go:355] .status.conditions["APIServicesDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:24.941797987+00:00 stderr F E0224 10:14:24.941722 1 base_controller.go:279] "Unhandled Error" err="openshift-apiserver-APIService reconciliation failed: unable to ApplyStatus for operator using fieldManager \"openshift-apiserver-APIService\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=openshift-apiserver-APIService&force=true\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:25.315735766+00:00 stderr F W0224 10:14:25.315324 1 base_controller.go:242] Updating status of "CustomRouteController" failed: unable to ApplyStatus for operator using fieldManager "CustomRouteController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=CustomRouteController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:25.315735766+00:00 stderr F E0224 10:14:25.315363 1 base_controller.go:279] "Unhandled Error" err="CustomRouteController reconciliation failed: Get \"https://10.217.4.1:443/apis/route.openshift.io/v1/namespaces/openshift-authentication/routes/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:25.455285098+00:00 stderr F E0224 10:14:25.455209 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:25.884465678+00:00 stderr F I0224 10:14:25.884357 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:14:25.885215208+00:00 stderr F E0224 10:14:25.885151 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Put \"https://10.217.4.1:443/apis/config.openshift.io/v1/clusteroperators/authentication/status\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:27.332533838+00:00 stderr F E0224 10:14:27.332479 1 base_controller.go:279] "Unhandled Error" err="TrustDistributionController reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-config-managed/configmaps/oauth-serving-cert\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:27.949387537+00:00 stderr F W0224 10:14:27.949327 1 base_controller.go:242] Updating status of "WellKnownReadyController" failed: unable to ApplyStatus for operator using fieldManager "WellKnownReadyController-reportDegraded": Patch "https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=WellKnownReadyController-reportDegraded&force=true": dial tcp 10.217.4.1:443: connect: connection refused
2026-02-24T10:14:27.949387537+00:00 stderr F E0224 10:14:27.949367 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:14:30.514295702+00:00 stderr F E0224 10:14:30.513538 1 base_controller.go:279] "Unhandled Error" err="OpenshiftAuthenticationStaticResources-StaticResources reconciliation failed: [\"oauth-openshift/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/authentication-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:openshift-authentication\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/serviceaccount.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/oauth-service.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/services/oauth-openshift\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_role.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/roles/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-openshift/trust_distribution_rolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/namespaces/openshift-config-managed/rolebindings/system:openshift:oauth-servercert-trust\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"OpenshiftAuthenticationStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=OpenshiftAuthenticationStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:30.578862199+00:00 stderr F E0224 10:14:30.578765 1 base_controller.go:279] "Unhandled Error" err="NamespaceFinalizerController_openshift-oauth-apiserver reconciliation failed: Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused"
2026-02-24T10:14:31.285823126+00:00 stderr F E0224 10:14:31.285747 1 base_controller.go:279] "Unhandled Error" err="APIServerStaticResources-StaticResources reconciliation failed: [\"oauth-apiserver/ns.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/apiserver-clusterrolebinding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:oauth-apiserver\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/svc.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services/api\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/sa.yaml\" (string): Get \"https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/serviceaccounts/oauth-apiserver-sa\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_binding.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterrolebindings/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/RBAC/useroauthaccesstokens_clusterrole.yaml\" (string): Get \"https://10.217.4.1:443/apis/rbac.authorization.k8s.io/v1/clusterroles/system:openshift:useroauthaccesstoken-manager\": dial tcp 10.217.4.1:443: connect: connection refused, \"oauth-apiserver/oauth-apiserver-pdb.yaml\" (string): Delete \"https://10.217.4.1:443/apis/policy/v1/namespaces/openshift-oauth-apiserver/poddisruptionbudgets/oauth-apiserver-pdb\": dial tcp 10.217.4.1:443: connect: connection refused, unable to ApplyStatus for operator using fieldManager \"APIServerStaticResources-StaticResources\": Patch \"https://10.217.4.1:443/apis/operator.openshift.io/v1/authentications/cluster/status?fieldManager=APIServerStaticResources-StaticResources&force=true\": dial tcp 10.217.4.1:443: connect: connection refused]"
2026-02-24T10:14:32.701041337+00:00 stderr F W0224 10:14:32.700286 1 dynamic_operator_client.go:352] .status.conditions["IngressStateEndpointsDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:32.701041337+00:00 stderr F W0224 10:14:32.700315 1 dynamic_operator_client.go:355] .status.conditions["IngressStateEndpointsDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:32.701041337+00:00 stderr F W0224 10:14:32.700323 1 dynamic_operator_client.go:352] .status.conditions["IngressStatePodsDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:14:32.701041337+00:00 stderr F W0224 10:14:32.700330 1 dynamic_operator_client.go:355] .status.conditions["IngressStatePodsDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:14:34.505856374+00:00 stderr F I0224 10:14:34.505759 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:14:34.511739043+00:00 stderr F I0224 10:14:34.511696 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Available message changed from "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node." to "OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:14:38.717606517+00:00 stderr F E0224 10:14:38.717073 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:15:03.479816910+00:00 stderr F I0224 10:15:03.479376 1 reflector.go:368] Caches populated for *v1.IngressController from github.com/openshift/client-go/operator/informers/externalversions/factory.go:125
2026-02-24T10:15:07.086423205+00:00 stderr F I0224 10:15:07.086142 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:07.158402670+00:00 stderr F I0224 10:15:07.158323 1 reflector.go:368] Caches populated for operator.openshift.io/v1, Resource=authentications from k8s.io/client-go/dynamic/dynamicinformer/informer.go:108
2026-02-24T10:15:07.164840066+00:00 stderr F I0224 10:15:07.164783 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:07.172385597+00:00 stderr F E0224 10:15:07.172303 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:07.179423467+00:00 stderr F I0224 10:15:07.179359 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:07.187394378+00:00 stderr F E0224 10:15:07.187339 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:07.202245596+00:00 stderr F I0224 10:15:07.202173 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:07.209790427+00:00 stderr F E0224 10:15:07.209734 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:07.231950721+00:00 stderr F I0224 10:15:07.231830 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:07.237192720+00:00 stderr F E0224 10:15:07.237151 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:07.280250867+00:00 stderr F I0224 10:15:07.280178 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:07.285114178+00:00 stderr F E0224 10:15:07.285084 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:07.368628534+00:00 stderr F I0224 10:15:07.368542 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:07.373838973+00:00 stderr F E0224 10:15:07.373796 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:07.489819657+00:00 stderr F I0224 10:15:07.489741 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:07.494472193+00:00 stderr F E0224 10:15:07.494432 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:07.536579159+00:00 stderr F I0224 10:15:07.536524 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:07.541551183+00:00 stderr F E0224 10:15:07.541490 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:08.184001105+00:00 stderr F I0224 10:15:08.183929 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:08.189710224+00:00 stderr F E0224 10:15:08.189585 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:08.922591070+00:00 stderr F E0224 10:15:08.922269 1 base_controller.go:279] "Unhandled Error" err="WellKnownReadyController reconciliation failed: failed to get API server IPs: unable to find kube api server endpointLister port: &v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)"
2026-02-24T10:15:09.471836987+00:00 stderr F I0224 10:15:09.471774 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating::WellKnownReadyController","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.\nWellKnownAvailable: The well-known endpoint is not yet available: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"OAuthServerDeployment_NoPod::WellKnown_NotReady","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:09.476553113+00:00 stderr F E0224 10:15:09.476404 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:09.884001368+00:00 stderr F I0224 10:15:09.883848 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:09.892687295+00:00 stderr F W0224 10:15:09.892618 1 dynamic_operator_client.go:355] .status.conditions["WellKnownAvailable"].message is missing; this will eventually be fatal
2026-02-24T10:15:09.892747116+00:00 stderr F W0224 10:15:09.892733 1 dynamic_operator_client.go:352] .status.conditions["WellKnownReadyControllerProgressing"].reason is missing; this will eventually be fatal
2026-02-24T10:15:09.892778027+00:00 stderr F W0224 10:15:09.892766 1 dynamic_operator_client.go:355] .status.conditions["WellKnownReadyControllerProgressing"].message is missing; this will eventually be fatal
2026-02-24T10:15:09.923559216+00:00 stderr F W0224 10:15:09.923179 1 dynamic_operator_client.go:355] .status.conditions["WellKnownReadyControllerDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:15:09.930409252+00:00 stderr F I0224 10:15:09.927795 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"WellKnownReadyControllerDegraded: failed to get API server IPs: unable to find kube api server endpointLister port: \u0026v1.Endpoints{TypeMeta:v1.TypeMeta{Kind:\"\", APIVersion:\"\"}, ObjectMeta:v1.ObjectMeta{Name:\"kubernetes\", GenerateName:\"\", Namespace:\"default\", SelfLink:\"\", UID:\"5d4ec001-2800-496a-8ad0-e8c9d0daf296\", ResourceVersion:\"29847\", Generation:0, CreationTimestamp:time.Date(2025, time.February, 23, 5, 11, 12, 0, time.Local), DeletionTimestamp:\u003cnil\u003e, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{\"endpointslice.kubernetes.io/skip-mirror\":\"true\"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry{v1.ManagedFieldsEntry{Manager:\"kube-apiserver\", Operation:\"Update\", APIVersion:\"v1\", Time:time.Date(2025, time.February, 24, 6, 16, 2, 0, time.Local), FieldsType:\"FieldsV1\", FieldsV1:(*v1.FieldsV1)(0xc002c18ab0), Subresource:\"\"}}}, Subsets:[]v1.EndpointSubset(nil)} (check kube-apiserver that it deploys correctly)","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:09.937911022+00:00 stderr F E0224 10:15:09.937804 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:09.976512509+00:00 stderr F I0224 10:15:09.976441 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:09.984175553+00:00 stderr F E0224 10:15:09.983584 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:11.083552594+00:00 stderr F I0224 10:15:11.083434 1 request.go:700] Waited for 1.068738275s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-authentication/serviceaccounts/oauth-openshift
2026-02-24T10:15:11.488981832+00:00 stderr F I0224 10:15:11.488913 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:11.492306768+00:00 stderr F E0224 10:15:11.492266 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:12.039579418+00:00 stderr F I0224 10:15:12.039480 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:12.045733648+00:00 stderr F E0224 10:15:12.045679 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:13.818138355+00:00 stderr F I0224 10:15:13.818066 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:13.823003606+00:00 stderr F E0224 10:15:13.822948 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:14.088821783+00:00 stderr F I0224 10:15:14.088539 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:14.092067337+00:00 stderr F E0224 10:15:14.092020 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:19.269662989+00:00 stderr F I0224 10:15:19.269313 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:19.288186690+00:00 stderr F I0224 10:15:19.288124 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:19.296968810+00:00 stderr F E0224 10:15:19.295872 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:19.854990384+00:00 stderr F I0224 10:15:19.854930 1 reflector.go:368] Caches populated for *v1.CertificateSigningRequest from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:22.058734359+00:00 stderr F I0224 10:15:22.058673 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:22.405614218+00:00 stderr F I0224 10:15:22.405561 1 reflector.go:368] Caches populated for *v1alpha1.StorageVersionMigration from sigs.k8s.io/kube-storage-version-migrator/pkg/clients/informer/factory.go:132
2026-02-24T10:15:23.929671645+00:00 stderr F I0224 10:15:23.924539 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:23.931499466+00:00 stderr F I0224 10:15:23.931436 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentProgressing: deployment/oauth-openshift.openshift-authentication: 1/1 pods have been updated to the latest generation and 0/1 pods are available","reason":"OAuthServerDeployment_PodsUpdating","status":"True","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:13:13Z","message":"OAuthServerDeploymentAvailable: no oauth-openshift.openshift-authentication pods available on any node.","reason":"OAuthServerDeployment_NoPod","status":"False","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:23.934712519+00:00 stderr F W0224 10:15:23.934265 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerDeploymentAvailable"].message is missing; this will eventually be fatal
2026-02-24T10:15:23.934712519+00:00 stderr F W0224 10:15:23.934294 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerDeploymentDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:15:23.934712519+00:00 stderr F W0224 10:15:23.934302 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerDeploymentProgressing"].message is missing; this will eventually be fatal
2026-02-24T10:15:23.934712519+00:00 stderr F W0224 10:15:23.934312 1 dynamic_operator_client.go:352] .status.conditions["OAuthServerWorkloadDegraded"].reason is missing; this will eventually be fatal
2026-02-24T10:15:23.934712519+00:00 stderr F W0224 10:15:23.934319 1 dynamic_operator_client.go:355] .status.conditions["OAuthServerWorkloadDegraded"].message is missing; this will eventually be fatal
2026-02-24T10:15:23.936568830+00:00 stderr F E0224 10:15:23.936498 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:23.968408714+00:00 stderr F I0224 10:15:23.968341 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:15:23Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:15:23Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:23.973810267+00:00 stderr F E0224 10:15:23.973766 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:25.470056672+00:00 stderr F I0224 10:15:25.469977 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:15:25Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:15:25Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:25.473981981+00:00 stderr F E0224 10:15:25.473932 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:25.486572237+00:00 stderr F I0224 10:15:25.486506 1 reflector.go:368] Caches populated for *v1.Infrastructure from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:15:32.517760261+00:00 stderr F I0224 10:15:32.516048 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:33.224311420+00:00 stderr F I0224 10:15:33.224249 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:34.670945646+00:00 stderr F I0224 10:15:34.670840 1 reflector.go:368] Caches populated for *v1.Proxy from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:15:34.678533269+00:00 stderr F I0224 10:15:34.678474 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:15:34Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:15:34Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:34.684736739+00:00 stderr F E0224 10:15:34.684664 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:35.031397803+00:00 stderr F I0224 10:15:35.031253 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:175
2026-02-24T10:15:37.308488983+00:00 stderr F I0224 10:15:37.308418 1 reflector.go:368] Caches populated for *v1.APIServer from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:15:39.392636330+00:00 stderr F I0224 10:15:39.392585 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209
2026-02-24T10:15:39.508532192+00:00 stderr F I0224 10:15:39.508169 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:39.604125274+00:00 stderr F I0224 10:15:39.603084 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:39.904161129+00:00 stderr F I0224 10:15:39.904104 1 reflector.go:368] Caches populated for *v1.DaemonSet from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:41.004735396+00:00 stderr F I0224 10:15:41.004670 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:41.071104424+00:00 stderr F I0224 10:15:41.071051 1 reflector.go:368] Caches populated for *v1.ClusterVersion from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:15:42.913717085+00:00 stderr F I0224 10:15:42.913612 1 reflector.go:368] Caches populated for *v1.APIService from k8s.io/kube-aggregator/pkg/client/informers/externalversions/factory.go:141
2026-02-24T10:15:43.530006183+00:00 stderr F I0224 10:15:43.529930 1 reflector.go:368] Caches populated for *v1.Console from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:15:44.880007447+00:00 stderr F I0224 10:15:44.879954 1 reflector.go:368] Caches populated for *v1.Node from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:44.890787711+00:00 stderr F I0224 10:15:44.890724 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:15:44Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:15:44Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:44.894364883+00:00 stderr F E0224 10:15:44.894147 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:45.105790175+00:00 stderr F I0224 10:15:45.105727 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:45.193833485+00:00 stderr F I0224 10:15:45.193762 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:45.600868499+00:00 stderr F I0224 10:15:45.600812 1 reflector.go:368] Caches populated for *v1.Authentication from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:15:46.381132822+00:00 stderr F I0224 10:15:46.380789 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:46.396798778+00:00 stderr F I0224 10:15:46.396727 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:15:46Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:15:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:46.401663548+00:00 stderr F E0224 10:15:46.401607 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:46.485877411+00:00 stderr F I0224 10:15:46.485764 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:15:46Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:15:46Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:46.490942736+00:00 stderr F E0224 10:15:46.490861 1 base_controller.go:279] "Unhandled Error" err="StatusSyncer_authentication reconciliation failed: Operation cannot be fulfilled on clusteroperators.config.openshift.io \"authentication\": the object has been modified; please apply your changes to the latest version and try again"
2026-02-24T10:15:47.041052621+00:00 stderr F I0224 10:15:47.040983 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:47.902566099+00:00 stderr F I0224 10:15:47.902218 1 reflector.go:368] Caches populated for *v1.Role from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:48.069349118+00:00 stderr F I0224 10:15:48.069266 1 reflector.go:368] Caches populated for *v1.ClusterRoleBinding from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:48.811436353+00:00 stderr F I0224 10:15:48.811387 1 reflector.go:368] Caches populated for *v1.ClusterOperator from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:15:48.812555539+00:00 stderr F I0224 10:15:48.812533 1 status_controller.go:225] clusteroperator/authentication diff {"status":{"conditions":[{"lastTransitionTime":"2026-02-24T10:12:36Z","message":"All is well","reason":"AsExpected","status":"False","type":"Degraded"},{"lastTransitionTime":"2026-02-24T10:15:48Z","message":"AuthenticatorCertKeyProgressing: All is well","reason":"AsExpected","status":"False","type":"Progressing"},{"lastTransitionTime":"2026-02-24T10:15:48Z","message":"All is well","reason":"AsExpected","status":"True","type":"Available"},{"lastTransitionTime":"2025-02-23T05:22:47Z","message":"All is well","reason":"AsExpected","status":"True","type":"Upgradeable"},{"lastTransitionTime":"2025-02-23T05:22:46Z","reason":"NoData","status":"Unknown","type":"EvaluationConditionsDetected"}]}}
2026-02-24T10:15:48.824960080+00:00 stderr F I0224 10:15:48.822249 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-authentication-operator", Name:"authentication-operator", UID:"", APIVersion:"", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'OperatorStatusChanged' Status for clusteroperator/authentication changed: Degraded message changed from "IngressStateEndpointsDegraded: No subsets found for the endpoints of oauth-server" to "All is well",Progressing changed from True to False ("AuthenticatorCertKeyProgressing: All is well"),Available changed from False to True ("All is well")
2026-02-24T10:15:50.996593626+00:00 stderr F I0224 10:15:50.996527 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:51.702486849+00:00 stderr F I0224 10:15:51.702171 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:52.503274788+00:00 stderr F I0224 10:15:52.503183 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:53.110534031+00:00 stderr F I0224 10:15:53.110223 1 reflector.go:368] Caches populated for *v1.RoleBinding from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:53.134705860+00:00 stderr F I0224 10:15:53.134438 1 reflector.go:368] Caches populated for *v1.Ingress from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:15:54.500849931+00:00 stderr F I0224 10:15:54.500774 1 request.go:700] Waited for 1.01127787s due to client-side throttling, not priority and fairness, request: GET:https://10.217.4.1:443/api/v1/namespaces/openshift-oauth-apiserver/services?resourceVersion=29414
2026-02-24T10:15:54.502913047+00:00 stderr F I0224 10:15:54.502838 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:55.501689534+00:00 stderr F I0224 10:15:55.501630 1 reflector.go:368] Caches populated for *v1.ServiceAccount from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:55.702156177+00:00 stderr F I0224 10:15:55.702086 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:56.702864417+00:00 stderr F I0224 10:15:56.702281 1 reflector.go:368] Caches populated for *v1.Endpoints from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:57.302039337+00:00 stderr F I0224 10:15:57.301973 1 reflector.go:368] Caches populated for *v1.Pod from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:57.932615679+00:00 stderr F I0224 10:15:57.932346 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:58.105253930+00:00 stderr F I0224 10:15:58.104841 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:58.902140820+00:00 stderr F I0224 10:15:58.902101 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:15:59.903076605+00:00 stderr F I0224 10:15:59.902950 1 reflector.go:368] Caches populated for *v1.Service from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:16:00.702604375+00:00 stderr F I0224 10:16:00.702304 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:16:02.033811072+00:00 stderr F I0224 10:16:02.031638 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:16:02.483763631+00:00 stderr F I0224 10:16:02.483698 1 reflector.go:368] Caches populated for *v1.Namespace from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:16:06.878772098+00:00 stderr F I0224 10:16:06.877539 1 reflector.go:368] Caches populated for *v1.Secret from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:16:10.615482092+00:00 stderr F I0224 10:16:10.614927 1 reflector.go:368] Caches populated for *v1.Deployment from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:16:11.210128528+00:00 stderr F I0224 10:16:11.210058 1 reflector.go:368] Caches populated for *v1.OAuth from github.com/openshift/client-go/config/informers/externalversions/factory.go:125
2026-02-24T10:16:11.963102696+00:00 stderr F I0224 10:16:11.962527 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/client-go/informers/factory.go:160
2026-02-24T10:16:12.175871699+00:00 stderr F I0224 10:16:12.175764 1 reflector.go:368] Caches populated for *v1.ConfigMap from k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209
././@LongLink 0000644 0000000 0000000 00000000271 00000000000 011603 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lifecycle-manager_collect-profiles-29532120-q5v4c_2364f27b-fc75-4e56-8122-d6bdcc763b0a/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lif0000755 0001750 0001750 00000000000 15147276521 033065 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000312 00000000000 011577 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lifecycle-manager_collect-profiles-29532120-q5v4c_2364f27b-fc75-4e56-8122-d6bdcc763b0a/collect-profiles/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lif0000755 0001750 0001750 00000000000 15147276541 033067 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000317 00000000000 011604 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lifecycle-manager_collect-profiles-29532120-q5v4c_2364f27b-fc75-4e56-8122-d6bdcc763b0a/collect-profiles/0.log home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-operator-lif0000644 0001750 0001750 00000000421 15147276521 033064 0 ustar zuul zuul 2026-02-24T10:12:16.862876555+00:00 stderr F time="2026-02-24T10:12:16Z" level=info msg="error verifying provided cert and key: certificate has expired"
2026-02-24T10:12:16.862876555+00:00 stderr F time="2026-02-24T10:12:16Z" level=info msg="generating a new cert and key"
././@LongLink 0000644 0000000 0000000 00000000243 00000000000 011602 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-kube-apiserver_revision-pruner-8-crc_900a4d40-ef8a-4617-b48c-eaa896ee080f/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-kube-apiserv0000755 0001750 0001750 00000000000 15147276522 033060 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000252 00000000000 011602 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-kube-apiserver_revision-pruner-8-crc_900a4d40-ef8a-4617-b48c-eaa896ee080f/pruner/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-kube-apiserv0000755 0001750 0001750 00000000000 15147276542 033062 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000257 00000000000 011607 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-kube-apiserver_revision-pruner-8-crc_900a4d40-ef8a-4617-b48c-eaa896ee080f/pruner/0.log home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-kube-apiserv0000644 0001750 0001750 00000003553 15147276522 033070 0 ustar zuul zuul 2026-02-24T10:12:26.503305404+00:00 stderr F I0224 10:12:26.503100 1 cmd.go:39] &{ true {false} prune true map[cert-dir:0xc00069ad20 max-eligible-revision:0xc00069a820 protected-revisions:0xc00069a8c0 resource-dir:0xc00069abe0 static-pod-name:0xc00069ac80 v:0xc00069be00] [0xc00069be00 0xc00069a820 0xc00069a8c0 0xc00069abe0 0xc00069ad20 0xc00069ac80] [] map[cert-dir:0xc00069ad20 help:0xc000344500 log-flush-frequency:0xc00069bd60 max-eligible-revision:0xc00069a820 protected-revisions:0xc00069a8c0 resource-dir:0xc00069abe0 static-pod-name:0xc00069ac80 v:0xc00069be00 vmodule:0xc00069bea0] [0xc00069a820 0xc00069a8c0 0xc00069abe0 0xc00069ac80 0xc00069ad20 0xc00069bd60 0xc00069be00 0xc00069bea0 0xc000344500] [0xc00069ad20 0xc000344500 0xc00069bd60 0xc00069a820 0xc00069a8c0 0xc00069abe0 0xc00069ac80 0xc00069be00 0xc00069bea0] map[104:0xc000344500 118:0xc00069be00] [] -1 0 0xc000586450 true 0xae1ae0 []}
2026-02-24T10:12:26.503305404+00:00 stderr F I0224 10:12:26.503274 1 cmd.go:40] (*prune.PruneOptions)(0xc000780000)({
2026-02-24T10:12:26.503305404+00:00 stderr F MaxEligibleRevision: (int) 8,
2026-02-24T10:12:26.503305404+00:00 stderr F ProtectedRevisions: ([]int) (len=5 cap=5) {
2026-02-24T10:12:26.503305404+00:00 stderr F (int) 4,
2026-02-24T10:12:26.503305404+00:00 stderr F (int) 5,
2026-02-24T10:12:26.503305404+00:00 stderr F (int) 6,
2026-02-24T10:12:26.503305404+00:00 stderr F (int) 7,
2026-02-24T10:12:26.503305404+00:00 stderr F (int) 8
2026-02-24T10:12:26.503305404+00:00 stderr F },
2026-02-24T10:12:26.503305404+00:00 stderr F ResourceDir: (string) (len=36) "/etc/kubernetes/static-pod-resources",
2026-02-24T10:12:26.503305404+00:00 stderr F CertDir: (string) (len=20) "kube-apiserver-certs",
2026-02-24T10:12:26.503305404+00:00 stderr F StaticPodName: (string) (len=18) "kube-apiserver-pod"
2026-02-24T10:12:26.503305404+00:00 stderr F })
././@LongLink 0000644 0000000 0000000 00000000270 00000000000 011602 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-cluster-version_cluster-version-operator-5c965bbfc6-hh7k5_a0e2e597-dd85-4b96-ac3e-67bc94cc1c2c/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-cluster-vers0000755 0001750 0001750 00000000000 15147276522 033121 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000321 00000000000 011577 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-cluster-version_cluster-version-operator-5c965bbfc6-hh7k5_a0e2e597-dd85-4b96-ac3e-67bc94cc1c2c/cluster-version-operator/ home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-cluster-vers0000755 0001750 0001750 00000000000 15147276667 033133 5 ustar zuul zuul ././@LongLink 0000644 0000000 0000000 00000000331 00000000000 011600 L ustar root root home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-cluster-version_cluster-version-operator-5c965bbfc6-hh7k5_a0e2e597-dd85-4b96-ac3e-67bc94cc1c2c/cluster-version-operator/0.log.gz home/zuul/zuul-output/logs/ci-framework-data/logs/crc/crc-logs-artifacts/pods/openshift-cluster-vers0000644 0001750 0001750 00000642206 15147276522 033135 0 ustar zuul zuul ‹R}i0.log ä[sÛF²€ßϯ@ñÅÉ9=÷‹ªüo׿â²Í“KCG À@ÉÊÖþ÷Ó‚ E‘@j•¤"‰hb_7zzîá#âö £Œ/(c¬±Ò‘ÿAè!//&&˼½wˆæmÉ))¹·úƒXãëô‚ÐÏÞñ2/Lö“åQšü¾0YP¤™ÇÆX‘OáŠÂã_SÁD€Ñ8Ès3¿ŠïÇy‘™`>6±ö«kÿEö©*ERpæRU0BTjl3± ÐÎêŒ þì}š™ê’·¾æ]G·&÷˜—™"‹à· ™xA§w¹7…¢(÷Ò©Æixãå7æn\Þåfyeü`å&»…»MÒ»¤ˆæÆ+ÒH$¡ñ¢Ü“*{¦Y^xIšø×Yšé2¶*äÆÂ.£<*• a2g´ÿºè¿ˆÈÿ=ÞÏK1J˜¤ÒÅK1"IÍË$··AVr’ä³7úÑÅ23ÞuPob¦Á2.¬ý3ò¦«koFï 47Ù“§Ë,4•/ŒànÁUl&o¦Aœ›ƒj*…‘v«I¥µHË´š”.õß·xü>K¿Ü{Ó,ƒ³åÕ8Lç¯Ó…IòY4-^‡¥®þuú:L“itý:ª`ç¯Íxï’ ¾]áÎ_O[æýÊËùÒšsÁ…ó´bºÍU¦øÉZâKcÙæ±†¹ážŒ $ãH9žä¸j÷d¥š¿‹ÕCÝ@¬ŠÒÇØè¿®@‡ÔU’RÅÜê*&ju—tc_G{wÆ8(\ëUÃõ+¤Ád%~Þ@”žLÌd|@ìÀ‘º„ÅNQWzÃyF)¨Z]†áËìô^—”iéV—SÙÒ+üy×fRy‡
¾î ¨=´n ”d‡”ÒMü±þ(Š£âÞu&«*zDP¿xß÷óæÕ›oî$M`ú,š˜üX(ÈÓäÍ«MñÊ››<‡}óêm”ÃÍ¢äÚƒ¬$gÑ»ÈQÊ/{•GyéúëÞ"3·`À|ýg¼_e™™ƒØ–è•û0E”,¡ñ«or”˜’¾(¶ª[;/óËÔÇ•÷"êtÒ—Yš®ŸáM™OâC
H¬¸Ä
ШC®#À¶áU†ð¸žÎ?¤ËÂ|¼OÂËË;½…¬³Ø¾–_\¼#Æi0É›~eËÖÔÒu$
W¥{ù,]ÆÈ:0èú‘'ð{qgLâÁ‹’Ö~’_xû•ÞzÞ¯€¤·Jv!Ìß{Ë2™‚¼×›Aæl›Y¯úçÒ@ûͤÔÞËJÅÇåqýCdY+ì‡eÑß>ÍЇÐ
¡ød]öZõC¯‰¢RhL¯‰‚À¼¯¥!úý€?Ú÷=K \…®S«Z”€Ž‡JWð±3‘µZ*ü•æáì³…™/JM [Ù(ÉêÕ*žlEç•oú•—½®~ŽÇ4Õâ ’®6©•CèkšÚú-_†!¼$ЂKWŠNšªxH?*!¯Àný Š~lGÈR?{’ät -Í(Y‡íï¼enÉF¦«¶ømáFÀ}uŸåâjÜD4@G5U[÷ÖËœ r¿ÀVåbúUWWiÀèõèPÉÌ•»äí
¾¬ŒÊr¥üìýÍþõ
ä¿_ý˜ñƒ™‚A¡ý¯¿GÉäbô‹5Úè;ï· Âޚţƒ¬Ä.F›¿ÿx÷öbd¸6TÌŸ„’ûŒ‰‰°€ùÓpz5 ÐU¨H²ß¿WÕ¼£0M3À”nU¥A·„vZ»#"1'páÇÈÄ“÷A1»þý-¨4.¼W¿A¾Äë
>ø¥tÙ¿U.ûʳð’O¡±)Hè+jŸM€s€é3%Õ[+$!z‡ðp•˰ƒFƒp'\šq½iýÏm×G˜—©œ}Ï]ý
éaVx1ÔÔ&±ŽasÄŸ?}zÿÑÆ!4.ÿ½ÐHëºH¤Ô½N]$â|ŸW2müï³pÀʾ¥3Ú·\ÂðÔÀûf•$|[uáÜšÊk³eÙ'sá‚ùD°ý.L1GLƒ¢5)fZ©}jÇ|W,_Ÿ¡ÖN‚²XTèþÛñR]]_"¼¾¶®‹ýUUö[ZÕaã0›Œïƒy<ò~‚P¿°³ˆlÛ!)å+×yåË⪚°òÑ·f%e*3Z½Þh§¼ñ*‰~P·@ìíª3edëL[)Úøù]Ù7Váð×UÀò!`½Ùy‚ýÔ¡>” î¢r˜öOý¹}9rdîž3ù=O±Ÿ>EŒX'}äúŸL8ûÀ¿ï1öóg¢'ÔÅŸi$uþô²jocÏ
d¿ÐÀ±m; iSï""höu=^_<qE9~WÖdåÂC¡
Ñ8" B(ÌYƒ"Cc˜4°5š(E$Â̙׃œ`mÞ
Œö™#XBr¶°ÌºsÿgÈ ³Õ“tM~§¨µA”Ø0ã½dsO×þ,ºžùÁmÅë^¤eÈÐûH©tת7ºAÿ_Wêÿü}ï5@3à½}hˆ"F˜3èC“šëÐ÷ûÇß8Ôk¥9Äqá4Ò˜
d‚A¢}ÿ6hà‚67×Î.#+Gº{®‚ðf¹è?ݬÊ9Qaˆ †0§N¸¤:‡;D8épÓ0ÂÕ’3¢œ©f¸sȃŒþ(?!P(D'f©Uw˜«Æz4‡ø¼Hã(ŒÌ`]c
=UÁð#•"‚êû€}c}£o\0C êôzã¼_üCvŽõÍ¿yØ!H”¹FMA`Øxs†"Îj”"®XO ‡ˆ0gZ(•)ç]+×a×Ê bÊùÊ™’q'rÎéù@QätáC3¢¥N´š!Ö5ÚÁâÆIÃD
áì-´rLux¸HqÚÁ• \qg5Èí<´î 'Ó,È‹lYNo V<,ïTAC)®ÉâV©Þ`=zÞ4Œph¨`…¹+Œ€#¬7èÃēީ7,SMS®
äd‡¹G’N'e)'
"Có\C•ç+ˆäƒ"tô·qÀÀ’k‚¨3``Û
Û1àAÂD_„›"”TŠ»f=X¹•JÇ"ÎÙ™,c“
0ï§.êTa‚@ÃPEˆ5eºÄƒÌêésã€AG3'j;û°ofÎNŸ¬›‡F€#€uÁ†dîˆè\diì/â 1þ<gQRªYöU¯.–תKpe€Ašý厫ß/œSJ•v:=‡ >¤µÎƒ aâì9Nø€öfg8ƒ4T‚i›Ir§E˜f²ELN,|ûs¨9&[e×õÑàÑG$kàíµÆ³íÁ¥o¾Í#Š„€BœóıV2$`ô
¹y”Hs…³9Ü2JÔZ^ÚõÀQhü0°KU’õÊ´5ÆzéaÍm³qs«ÞæsÉ4åœ9#¨dÛ›k<
yàÃÄÎFM©1WR:»Ž@®ÕÊG<‡Š—'Ž”
c,©sÒÈ!Õ‰Ÿ#O…Œ`éle»° ÍðÝ,ØXþ"Ko#(Â/U/ ‚(—ôÁ“ÙùËAœûÕF ; Ã8]N6bYÕÀ7·ù°ºËhkq·÷`u7ÜÎßܯn÷ï‰ÃÛê×Ze¼”qw×È‘Vº}ØÎX‹¦óEšØm_Õkõ¦:‡
P—ùù°p5Åaä„«‰ÐGÃ=:#؆Öieö]sdœb™’k’È!‰:@†ŸOpîòÁ<·¹p«UîÏÙÎ!
Á1v.°rT¼,C\‡‹!Í GlbþÂÞ‡Ez-É!CA˜9sõÒdêe™â6_ÌÌÁ‰1ŠÜ{g‚UÝTÖ&Ü̓E§ âú³°JÅKäþªÈá˜r;ìëÜä(ï‚)Y÷)]a˜.“âÒ+±ïWRGs=G šÞðãAŽò>ƒñŒ
Ô€§—Ú Ï;s5KÓ›u¥ÃAºSÞpd%„bwÍ&©–¥—ÙU^filv[ÚöÂØ.ûN³è¯íä6vu§ðåsyÑãc”߆Ûsˆ¡²_…œ;âï¤Â.Ã9Tò¶/hóq/uý û:ì‰HSíJŸ@ŽÚÕ¾¶à®ÛN¶ã;)ZóÔ€M ‚\Ým ‡5ë‹§íè–hý
í™bN4aÂÕdåX_L¡¡ß)Ñã;Úód˜2¥±kLäÀ—{â]ÍËf§P×7=YN8†hêôT먪'²vgטvÊuuË“Qµµ>§Î͵ԺÕ,Á&T«nN±vÓUÒ’+#;‰O Dz½RËŽêþlâJ©:ÙŠ!ŒíQYù¸úsüůntþ¨ z^¨Ÿ'dLžäõ<Ôg ™àçÙNö}Žœ)zVœ'f§÷órnųĞîEšÆÏtW¹j¬’(ãH0™”»TžvJ©pœ}V™?WìWQy°Ï󦯟Ut™™ .fáÌ„7Ï“·àσwýÕÕ¸s>®h9#èkîÚS`%Ç»I¿Ë±ú¥?bôèW÷8‡‘ާò@>"xöÃIž´ã5uÑ ŠÑzy—¯=y3·/vf®#{‚Á>ÄÿâhØÃãþ\ÝeÕá´\I??¤R<¤·µX=&>Ž®¶'™q7]ÝÁ*†KŒ/7
µG5Ù"¯9¾¥žÑ˯˜ÖØ1o%×E6ŒÉúÏz!ÌÎܽ={!ìTS¿ïN¿ënô¸97&•]j謙ìù-»1×+·ýÂNÀY¯Âî{u]Ýãv’=€g’!¥‹1g©~±â®OÎÍÖÜY†ŠI-š”r´íh½‹õ «ðú„Ý€»£‡°'çuI›^nºx 'ÛWJ›baÇáÞ¥œ@¼7ÒC†‘“îœbIÚ¬Ëu[)g£í‹ø Áä´{£à1†hÂ8§®šäx«ÍÀi}¨€d¦œ±E]ÖŸÎÒ|ß)k_Yñøø†~~EÍ^’©$-V'ûì¡“>û©‡Ô³y²4‰Â†<¸Æ’påj{‚j5~Ã7}µšMì§›#É·ÎÛó+ïB’¿u¶ùn‚ßÓÎÀB x3Ü™&È!Iúgö¸²8w~3HÂ…“†6Sßüö†þsH(᮵é¥iµo¸àîY‚ݾ·Ë$3azD™‰wÄKsÉ7Ó Îk…?…€YÌŒ¿³©ãДjA”v‚¦”ñA@÷÷²ŸtƸØ
µ;Ýá©Ð{çC]ILwSW¢Õf"ÛÔóÈÏ“`‘ÏÒ¯vŒWûŠTi[¯Ã«–áù³Í¡¼OXâhI;Êj˜&IÊ´ÔÔÕ·rGû¤“¿¬·˜ÃyÊR¦¬|[ZS`ŠÙžˆXËsΟL<V
ØËíÑàg‡ø"sáô7…Ú ? ŸÜÑ8í«ƒÝ½‰
SI•v&
“V-Û“‰®æÕêÿ*>w3ú“CIp·Çû4 ÚOþI°]W$…kH
ä¤<2-*WðûÕxäý6úUþÝ‚Xä£q£õG›C3qâê"³rèH‡Ë™Éóí‹ú³³ÞIcäÖJ¦Ó[ƒ‹nÍö2§7†TÿAÆØUæ+6âè*€|¦ç·ÂžP†°ÛŠ#ܵ!ˆß_-|ô£½±µRD(W*
r¢ÕvÛ[lo–W¦N8n!σ<ÌŸG׫zv˜¼§™µŠ÷g€Îˆrz¾ˆéù›,»§±‘ø¶©RNêdÕHÂEæb“V^ì–^–:Ô˜ÕS0Kq¦˜wŒgL[k*¤fNÚZ;Âñ˜6Ûçá¾ùàÚQ»íŽËžµ JPB¨Ë±AŽé#S˜yšDm×ÇVgR•ç¦ÀG¨=ºô£wFÂÙrR£íñn~±L@樷Æê×Ê}}¯PoÔ5TPæZ±rœéÙy0_Äf;'½ß-óíG}‘–ÐÒäœ9§-Y¹V“¶IïôF=è\
³Ã݃û·²¯{ïW·Ý3@Ò OP»-%BÚùüBPÑõóËÝ=¬8Ôå׃ÂvomâÄ 0¥]cP[}ì6Y:¢s½Á£ÝòŸÐ·.±–P™:WÒ‚œP¸cLuÓ—~œ£€µ«ÿäÒ½¼Ïü0¸žb3áDcÚ€5'¼ëØŒëÉhõËyØçÚ¬¥¨Jlèvô•Ò9oJïÅ#Gƒ¿L,§î5
îrß\åå`Ó$‹n‡ÀyŠ%´~1–°›õù“(¿Ü„+å¬@‹—eŒ)<ÊàÆ`É&Æ ø¥Ã*v»ý«8
‡988ÔÀìżոډì¡cMìÁ_LÍê ¼³5„z1*½²bh;`Œ…@
ì Ù‹±C-{;¿6Û€nj{tݦÁ„¼@ÓT6YdéUlæþÄ&ìÕ BJΕs±È Õv&´>íœØ!&Ší–µ}"úý•QMu9$:"ªëÏñò:Jú?¹÷aqãêÏ¡Wƒó2
5á„ÍiëÙFnØC¬îxÓ¶—‚+NÝ>.{ƒ>Èáþ©7–VHsd·-q`9F[b‡g„PW<œÉU‚
ÕRt_z¥‡º¾ù`À0Ñ‚iâêçµrm“=ÀèºËÛŽ?hßü·ŠãfÞ[¥DµžŸáÖÌÙñ¦úüx;ö}{ös$Îä Äs.3ÈŒ)WWH“hÁ»¥Y”¬©çìyGžJF‘NòT¶]Lµ—üúÃIP×A1Û¬˜ìºê{\Òú ÈÓTX &Ü3†¬\Û¼z/ñ‡Ë;ÎñIÞ‡VÊ%cN´
·ð¶-󷜸¾Þµo»ïº9°÷UÒ¬• ]RþZÈx€ó»ê6oá6?•·Ù35h’Û#Ü3&<»3’¢×5
‡CïöÝ·^~ r¬3šù_‰}‹,ýrï,ñ#¬åÒ„r2TYÄpKµPZ7`¬)†ñqÇ¿>"k¾,ÒlÐ Ma*œŸZ¹¶<éWC@`æiòÑϨy¡íÞ§L0—ׂœP-k¬4žÛȺÈç5äñÖf½‡ÙºÛ9ަ&¼cSÝwk 7oì°}=Ê%
«Ë}E_Í –9
\Û†DÉXúðãLokÒ#YF¡ú—n²Œ´í/+É*?„”(N¯Ï„î®6ý¶s·5v9ܲV«Ÿwd7¦XÄ äé˾¶ŠÙšKP6 TɆf–kDäZ§cUÕ~û`›•×vMtOa›Éª{®õVQ„¹Ô®VƒV¤ÝÙ› ¶0y‘—ÿ÷3có!{Bë|ñÃú{í^h
¤@Ü5"rJ´™„"·V™âîÿÉ»öÞÆ$ÿUÿ“ 0²ûý0.‹õ¼’.—ÁI€MѶn$Q'Jž8Á~¬û÷É®š/Qº)ŠÝ’áÝÍ:–Êìæ¯ª]Ý]]•Ì¿®å‚Îv\{¼]0ÌýœAy‘£©mGy»0æœ0ŠcÎ:U5ycê0XÕR
;àv1JÉ9Bi,É„r¹NùžÛáÔWª‚zK+“ž¦pÌ£,Qš¹éŽ£IŸ?̦xÙØÜöw{°Ùàya~£v„( kv+Æ„tJñÆ>B|àÜ.èÀ`È¢[y3Ìq¿X{‰4ðvË•? H0&¦x‡
mX”vò• íâý®.ÿÕ=s”
ï¾úê2À„ÍMeÖ$”ýëƒ.œ‚Ûš'ÒL!‹o–É)¡úØG8E¸=9˜ŠHÖô6ˆ¥T–ýjU "_-¤W‰XŠª‘>B×[,KD¬MóÍ ˜ Ÿsú ǰr‡¾§˜GÏhK3˜ÉáÒ¦J„t¨_AžÕК‹L&Š$¶Ž*˜¢}éaíõM÷d´Ýäi°Un%¬ø+Ù)Ë`[ü=hò©ƒÖ|ĉGÓ6‡ä„Võà³l“OE´g$F%ŠXgF…dN41K’±gFÊš<
FbZ!,™²â¯%Gñ÷ÎH~tК‘8i&g›8xHØ¡ü3’E´g$QRZçha&òž5‘¤7ËÑxèŽÊöNƒ‹U+fõN¬§•+ä=‘7ô[³à¿`«8ëT¡•|R7ìÁ?’Hª…u&