--- apiVersion: v1 items: - apiVersion: v1 data: cnibincopy.sh: |- #!/bin/bash set -e function log() { echo "$(date --iso-8601=seconds) [cnibincopy] ${1}" } DESTINATION_DIRECTORY=/host/opt/cni/bin/ # Perform validation of usage if [ -z "$RHEL8_SOURCE_DIRECTORY" ] || [ -z "$RHEL9_SOURCE_DIRECTORY" ] || [ -z "$DEFAULT_SOURCE_DIRECTORY" ]; then log "FATAL ERROR: You must set env variables: RHEL8_SOURCE_DIRECTORY, RHEL9_SOURCE_DIRECTORY, DEFAULT_SOURCE_DIRECTORY" exit 1 fi if [ ! -d "$DESTINATION_DIRECTORY" ]; then log "FATAL ERROR: Destination directory ($DESTINATION_DIRECTORY) does not exist" exit 1 fi # Collect host OS information . /host/etc/os-release rhelmajor= # detect which version we're using in order to copy the proper binaries case "${ID}" in rhcos|scos) RHEL_VERSION=$(echo "${CPE_NAME}" | cut -f 5 -d :) rhelmajor=$(echo $RHEL_VERSION | sed -E 's/([0-9]+)\.{1}[0-9]+(\.[0-9]+)?/\1/') ;; rhel|centos) rhelmajor=$(echo "${VERSION_ID}" | cut -f 1 -d .) ;; fedora) if [ "${VARIANT_ID}" == "coreos" ]; then rhelmajor=8 else log "FATAL ERROR: Unsupported Fedora variant=${VARIANT_ID}" exit 1 fi ;; *) log "FATAL ERROR: Unsupported OS ID=${ID}"; exit 1 ;; esac # Set which directory we'll copy from, detect if it exists sourcedir= founddir=false case "${rhelmajor}" in 8) if [ -d "${RHEL8_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL8_SOURCE_DIRECTORY} founddir=true fi ;; 9) if [ -d "${RHEL9_SOURCE_DIRECTORY}" ]; then sourcedir=${RHEL9_SOURCE_DIRECTORY} founddir=true fi ;; *) log "ERROR: RHEL Major Version Unsupported, rhelmajor=${rhelmajor}" ;; esac # When it doesn't exist, fall back to the original directory. if [ "$founddir" == false ]; then log "Source directory unavailable for OS version: ${rhelmajor}" sourcedir=$DEFAULT_SOURCE_DIRECTORY fi # Use a subdirectory called "upgrade" so we can atomically move fully copied files. # We now use --remove-destination after running into an issue with -f not working over symlinks UPGRADE_DIRECTORY=${DESTINATION_DIRECTORY}upgrade_$(uuidgen) rm -Rf $UPGRADE_DIRECTORY mkdir -p $UPGRADE_DIRECTORY cp -r --remove-destination ${sourcedir}* $UPGRADE_DIRECTORY if [ $? -eq 0 ]; then log "Successfully copied files in ${sourcedir} to $UPGRADE_DIRECTORY" else log "Failed to copy files in ${sourcedir} to $UPGRADE_DIRECTORY" rm -Rf $UPGRADE_DIRECTORY exit 1 fi mv -f $UPGRADE_DIRECTORY/* ${DESTINATION_DIRECTORY}/ if [ $? -eq 0 ]; then log "Successfully moved files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" else log "Failed to move files in $UPGRADE_DIRECTORY to ${DESTINATION_DIRECTORY}" rm -Rf $UPGRADE_DIRECTORY exit 1 fi rm -Rf $UPGRADE_DIRECTORY kind: ConfigMap metadata: annotations: kubernetes.io/description: | This is a script used to copy CNI binaries based on host OS release.openshift.io/version: 4.20.18 creationTimestamp: "2026-04-16T18:14:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:cnibincopy.sh: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"0e8e6ee0-4031-4fea-b5f2-393fc28d8115"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-16T18:14:13Z" name: cni-copy-resources namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 0e8e6ee0-4031-4fea-b5f2-393fc28d8115 resourceVersion: "2375" uid: 4ac8ae3f-bd12-42f7-b5cb-690784103e91 - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.18 creationTimestamp: "2026-04-16T18:14:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:allowlist.conf: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} f:release.openshift.io/version: {} manager: network-operator operation: Update time: "2026-04-16T18:14:13Z" name: cni-sysctl-allowlist namespace: openshift-multus resourceVersion: "2372" uid: faf0c2b7-361a-417f-a08f-2848acd5d78e - apiVersion: v1 data: allowlist.conf: |- ^net.ipv4.conf.IFNAME.accept_redirects$ ^net.ipv4.conf.IFNAME.accept_source_route$ ^net.ipv4.conf.IFNAME.arp_accept$ ^net.ipv4.conf.IFNAME.arp_notify$ ^net.ipv4.conf.IFNAME.disable_policy$ ^net.ipv4.conf.IFNAME.secure_redirects$ ^net.ipv4.conf.IFNAME.send_redirects$ ^net.ipv6.conf.IFNAME.accept_ra$ ^net.ipv6.conf.IFNAME.accept_redirects$ ^net.ipv6.conf.IFNAME.accept_source_route$ ^net.ipv6.conf.IFNAME.arp_accept$ ^net.ipv6.conf.IFNAME.arp_notify$ ^net.ipv6.neigh.IFNAME.base_reachable_time_ms$ ^net.ipv6.neigh.IFNAME.retrans_time_ms$ kind: ConfigMap metadata: annotations: kubernetes.io/description: | Sysctl allowlist for nodes. release.openshift.io/version: 4.20.18 creationTimestamp: "2026-04-16T18:14:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:allowlist.conf: {} f:metadata: f:annotations: f:kubernetes.io/description: {} f:release.openshift.io/version: {} f:ownerReferences: k:{"uid":"0e8e6ee0-4031-4fea-b5f2-393fc28d8115"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-16T18:14:13Z" name: default-cni-sysctl-allowlist namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 0e8e6ee0-4031-4fea-b5f2-393fc28d8115 resourceVersion: "2371" uid: 50514430-52e8-49e9-8b6e-b87fd8daca60 - apiVersion: v1 data: ca.crt: | -----BEGIN CERTIFICATE----- MIIDPDCCAiSgAwIBAgIIcGzcYl9AdHowDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQxNjE4MTAzN1oX DTM2MDQxMzE4MTAzN1owJjESMBAGA1UECxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdy b290LWNhMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArM8pFBdup1FR NMidmhznqCYcaHj8eFGRX77TygsoN3d3jTeWh7af+jDxz9jxEjXToqyrv4bnEbyn qgehVZFUXaGBNg6yVQgzTdjzb9sAnuCnOHgw4+yijB3qk0yDLvCccdKEiOphhe5c KrVovY7asbhQ6hcmyIcKdSSCGm+nMVcqmkVo82WAcSyK/XamncL2fv/8ETdM1R5N JqsplpanvcLM6mMtjJyJ9AufJDiehumg5ZtDaOW+MXQAWh/ofGVRhb93D7r2iWYS Z7C2YTwavTXsLp5by6mkjPBqPVGiXqC9B0dLGad0PNA86wJrpF24GrHV8XgVmsuc em23ZSXrWwIDAQABo24wbDAOBgNVHQ8BAf8EBAMCAqQwDwYDVR0TAQH/BAUwAwEB /zBJBgNVHQ4EQgRAhyr7PidO9nYMJCRoOatAsjntsbYpU0c9CVfSvTWZFWfooCNe 2CRKJO6r+rHE+EeYwXQULYm/nQpyQQUgShGPpzANBgkqhkiG9w0BAQsFAAOCAQEA FTjPEuWnabfqTcOEE/pFoLRqCl8DMCamjNYfSUQaINomrhOq1vEpei1ZUscDlTF0 OOAOVDoWqImiNNX9NyjbPND9Vmp+s+AjQCX8kIE35lrs0b6IlEwIwwg14HW+Vr/w NyIP4lUN9cpz6sgvxSULLXqElJy2v+rrJTPQ+6rmOkr945NawJIiqaV6fMW6W3Hx k0kVNVgaBYjSgvr6/Z5n1iwIjiguhC0uKhMsRv/SQThYNCDEU4BOsq1LZdPYXNoU 9VpXzl32CmVqYXXuSSoU3LY5Q4Ehd5h0hD4EGvQDkTBtE37TosWW4YBb1cbHfxF7 6Lt0h8SeSzp7QOZQ+NHIZw== -----END CERTIFICATE----- -----BEGIN CERTIFICATE----- MIIEADCCAuigAwIBAgIIVOERrt9z/j8wDQYJKoZIhvcNAQELBQAwJjESMBAGA1UE CxMJb3BlbnNoaWZ0MRAwDgYDVQQDEwdyb290LWNhMB4XDTI2MDQxNjE4MTEzMVoX DTI3MDQxNjE4MTEzMVowMDESMBAGA1UEChMJb3BlbnNoaWZ0MRowGAYDVQQDExFv cGVuc2hpZnQtaW5ncmVzczCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEB AMGiNg6OBo8+IeaHJJ1aLP93C5KQWzd7R+GpM/6Z6b4NiyRrf2CfXNZ/Jd9XgI3U R1Z6ECqba1i0/dEu5rTLDzM4/gWSAeUcPSjnTYhCu7Ho2iHqSOUZmc6OW/zUGgta Z4KBFVWD51Ztm+ilCwZhcp7kg8IUEdg+dqyt4h1ZG3+GRlv/uIuyEXQeMv+ws+rb VFtM9KY5PyUMDzwLVW6bNqP14MaZdcLnXTy+xRrgbl9opPnEkT/zbFv57V8cfSnD U/I7vBIX/M1BjoymHLWzzmOaj8W8Lux2w3Qv6FU3iyOyCqUxDgTlMSurEEV4K7l5 ZSfGv9LLreH2girMVtgeJUUCAwEAAaOCASYwggEiMA4GA1UdDwEB/wQEAwIFoDAd BgNVHSUEFjAUBggrBgEFBQcDAgYIKwYBBQUHAwEwDAYDVR0TAQH/BAIwADBJBgNV HQ4EQgRAnGwrgflWddo1TD1KrEUebvgb/1PFnPpXtg6du0oxalvoKlGHTQ1ZTSbE HCGpF5Q/pI1WEXBqAoUdBstetAfAkzBLBgNVHSMERDBCgECHKvs+J072dgwkJGg5 q0CyOe2xtilTRz0JV9K9NZkVZ+igI17YJEok7qv6scT4R5jBdBQtib+dCnJBBSBK EY+nMEsGA1UdEQREMEKCQCouYXBwcy4yZmRkNDZkZC04ZjBiLTRmYjEtOTBkMy0y MTQ2MGY5MDZmZjMucHJvZC5rb25mbHV4ZWFhcy5jb20wDQYJKoZIhvcNAQELBQAD ggEBAAS4Kket2DvlBvd0TMwbc6GQyXxejpUpXyaVXSGixRvG2jjizsD5yPi5tFBT 2lyfpXW1FI5/IhTieaxbTGRI7ZEwTozeS9Sp35BcUf0XS3F5eq7IdZUSZItXglLU 23AK3kazl4IgCxf+om/SLo3IZn48suhK3havvPItRj3Fp9hilszhc20BEscoCGDx +16BrB4JNZxsICYPx1DJvCfvWw5i0x7ECE9dLiARiA74ustaO+NzTbPMAKI5EZDa q5TEcjobEDJd4YafpaX55bX/lQIHEN0WPkYm7DC7CrSepbze3d8pvM6lL6aNnFy2 l6U4Hfh44pPA2U9z6CdG5/20lzo= -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: kubernetes.io/description: Contains a CA bundle that can be used to verify the kube-apiserver when using internal endpoints such as the internal service IP or kubernetes.default.svc. No other usage is guaranteed across distributions of Kubernetes clusters. creationTimestamp: "2026-04-16T18:14:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:ca.crt: {} f:metadata: f:annotations: .: {} f:kubernetes.io/description: {} manager: kube-controller-manager operation: Update time: "2026-04-16T18:14:29Z" name: kube-root-ca.crt namespace: openshift-multus resourceVersion: "4162" uid: eda00616-2c9a-4077-9158-a229c3522f7e - apiVersion: v1 data: daemon-config.json: | { "cniVersion": "0.3.1", "chrootDir": "/hostroot", "logToStderr": true, "logLevel": "verbose", "binDir": "/var/lib/cni/bin", "perNodeCertificate": { "enabled": true, "bootstrapKubeconfig": "/var/lib/kubelet/kubeconfig", "certDir": "/etc/cni/multus/certs", "certDuration": "24h" }, "cniConfigDir": "/host/etc/cni/net.d", "multusConfigFile": "auto", "multusAutoconfigDir": "/host/run/multus/cni/net.d", "namespaceIsolation": true, "globalNamespaces": "default,openshift-multus,openshift-sriov-network-operator,openshift-cnv", "readinessindicatorfile": "/host/run/multus/cni/net.d/10-ovn-kubernetes.conf", "daemonSocketDir": "/run/multus/socket", "socketDir": "/host/run/multus/socket", "auxiliaryCNIChainName": "vendor-cni-chain" } kind: ConfigMap metadata: creationTimestamp: "2026-04-16T18:14:13Z" labels: app: multus tier: node managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:daemon-config.json: {} f:metadata: f:labels: f:app: {} f:tier: {} f:ownerReferences: k:{"uid":"0e8e6ee0-4031-4fea-b5f2-393fc28d8115"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-16T18:14:13Z" name: multus-daemon-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 0e8e6ee0-4031-4fea-b5f2-393fc28d8115 resourceVersion: "2384" uid: 84cd913b-66af-4b48-871e-b36f46b98651 - apiVersion: v1 data: cabundle.crt: |- -----BEGIN CERTIFICATE----- MIIDUTCCAjmgAwIBAgIIEyoxfuupfnowDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTc3NjM2MzYwMjAe Fw0yNjA0MTYxODIwMDFaFw0yODA2MTQxODIwMDJaMDYxNDAyBgNVBAMMK29wZW5z aGlmdC1zZXJ2aWNlLXNlcnZpbmctc2lnbmVyQDE3NzYzNjM2MDIwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3tmTV5OSFiKwj4g5GBrWNHEOOW6SLUfk8 F+3d1jOTzAFfTLChMZD8LzIbQ0msZM3/ix4xRqinj3kyHEaA+1igbbYqPbgwE79H 9O0DeE8LkVeIZDcsItczVQIaHIN+h5tlyY4Dn0fbHR5fjtEb1anIQrYPx4vHT3FT ssMA2VqO6dDYAp4XUEY7KT1qEtZe/44O0Tj2cRqOLXzR9OnceeZ1OvXidfczkHsw 57tjaHs8vxbYy0AEClyUP/IX+qtXI118DCwG0i4ZaR5qdHvxIRThXti2p1oKb1M5 pDq3Dr3z2fkfLD3bGt4fCrxlPMKo2xMKY3Bm0DKJlbOzkZfNwDrBAgMBAAGjYzBh MA4GA1UdDwEB/wQEAwICpDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTzemIc ALdQDxlJzNicMwwFhZ38iDAfBgNVHSMEGDAWgBTzemIcALdQDxlJzNicMwwFhZ38 iDANBgkqhkiG9w0BAQsFAAOCAQEAn5J92b8Yv3U3DEXDST6LKFH1gqgzs03NVXYQ vVmg7dFUPVyYi9lnDckIqxzO/rQWI9lR7/AKJ9l6mfkbHFDQhYWuUo5TAfJJ9XrS LzWkFFMYvkYIZtkCDX+BQ0hYNJt5KP47SkkbTxcnlzAlzAV8NHItqZzTzfkRi+di 23da854WVAUJHbo0zuwd+j9WuQoJCe+c3lbN9AeHecImNcPRTGJS6nUlv5qOXVpS droxJ6cqjtCfxe2BgDnFtB3MXV/oHx2+mVgMSQ1xl6hn8RV+12FKV/tkNaShk6Or 3Hr89rT2g0PU5UfHqFT9/2Y3r+2a3DEIo1e4OcR2mDKqoF3E3g== -----END CERTIFICATE----- kind: ConfigMap metadata: creationTimestamp: "2026-04-16T18:25:42Z" labels: opendatahub.io/managed: "true" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:cabundle.crt: {} f:metadata: f:labels: .: {} f:opendatahub.io/managed: {} manager: manager operation: Update time: "2026-04-16T18:25:42Z" name: odh-kserve-custom-ca-bundle namespace: openshift-multus resourceVersion: "12965" uid: dcfc8464-0ac1-4121-98dd-76adb80c40f6 - apiVersion: v1 data: service-ca.crt: | -----BEGIN CERTIFICATE----- MIIDUTCCAjmgAwIBAgIIEyoxfuupfnowDQYJKoZIhvcNAQELBQAwNjE0MDIGA1UE Awwrb3BlbnNoaWZ0LXNlcnZpY2Utc2VydmluZy1zaWduZXJAMTc3NjM2MzYwMjAe Fw0yNjA0MTYxODIwMDFaFw0yODA2MTQxODIwMDJaMDYxNDAyBgNVBAMMK29wZW5z aGlmdC1zZXJ2aWNlLXNlcnZpbmctc2lnbmVyQDE3NzYzNjM2MDIwggEiMA0GCSqG SIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3tmTV5OSFiKwj4g5GBrWNHEOOW6SLUfk8 F+3d1jOTzAFfTLChMZD8LzIbQ0msZM3/ix4xRqinj3kyHEaA+1igbbYqPbgwE79H 9O0DeE8LkVeIZDcsItczVQIaHIN+h5tlyY4Dn0fbHR5fjtEb1anIQrYPx4vHT3FT ssMA2VqO6dDYAp4XUEY7KT1qEtZe/44O0Tj2cRqOLXzR9OnceeZ1OvXidfczkHsw 57tjaHs8vxbYy0AEClyUP/IX+qtXI118DCwG0i4ZaR5qdHvxIRThXti2p1oKb1M5 pDq3Dr3z2fkfLD3bGt4fCrxlPMKo2xMKY3Bm0DKJlbOzkZfNwDrBAgMBAAGjYzBh MA4GA1UdDwEB/wQEAwICpDAPBgNVHRMBAf8EBTADAQH/MB0GA1UdDgQWBBTzemIc ALdQDxlJzNicMwwFhZ38iDAfBgNVHSMEGDAWgBTzemIcALdQDxlJzNicMwwFhZ38 iDANBgkqhkiG9w0BAQsFAAOCAQEAn5J92b8Yv3U3DEXDST6LKFH1gqgzs03NVXYQ vVmg7dFUPVyYi9lnDckIqxzO/rQWI9lR7/AKJ9l6mfkbHFDQhYWuUo5TAfJJ9XrS LzWkFFMYvkYIZtkCDX+BQ0hYNJt5KP47SkkbTxcnlzAlzAV8NHItqZzTzfkRi+di 23da854WVAUJHbo0zuwd+j9WuQoJCe+c3lbN9AeHecImNcPRTGJS6nUlv5qOXVpS droxJ6cqjtCfxe2BgDnFtB3MXV/oHx2+mVgMSQ1xl6hn8RV+12FKV/tkNaShk6Or 3Hr89rT2g0PU5UfHqFT9/2Y3r+2a3DEIo1e4OcR2mDKqoF3E3g== -----END CERTIFICATE----- kind: ConfigMap metadata: annotations: service.beta.openshift.io/inject-cabundle: "true" creationTimestamp: "2026-04-16T18:14:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: {} f:metadata: f:annotations: .: {} f:service.beta.openshift.io/inject-cabundle: {} manager: kube-controller-manager operation: Update time: "2026-04-16T18:14:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:service-ca.crt: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:20:14Z" name: openshift-service-ca.crt namespace: openshift-multus resourceVersion: "8145" uid: 5e2d2273-ebe8-4ebc-adfd-c3edc0124d50 - apiVersion: v1 data: whereabouts.conf: | { "datastore": "kubernetes", "kubernetes": { "kubeconfig": "/etc/kubernetes/cni/net.d/whereabouts.d/whereabouts.kubeconfig" }, "reconciler_cron_expression": "30 4 * * *", "log_level": "verbose", "configuration_path": "/etc/kubernetes/cni/net.d/whereabouts.d" } kind: ConfigMap metadata: creationTimestamp: "2026-04-16T18:14:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:whereabouts.conf: {} f:metadata: f:ownerReferences: k:{"uid":"0e8e6ee0-4031-4fea-b5f2-393fc28d8115"}: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-16T18:14:13Z" name: whereabouts-flatfile-config namespace: openshift-multus ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 0e8e6ee0-4031-4fea-b5f2-393fc28d8115 resourceVersion: "2382" uid: 9fa8499d-0239-4f04-a5c1-4517ccf3fe45 kind: ConfigMapList metadata: resourceVersion: "33194"