--- apiVersion: apps/v1 items: - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "11131" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8350" console.openshift.io/trusted-ca-config-version: "8378" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "5" operator.openshift.io/spec-hash: 3af5efb003479db7e093e2b29226165ea5e0295af6f5500c0e6f0a18b43f413c creationTimestamp: "2026-04-17T17:30:29Z" generation: 2 labels: app: console component: ui pod-template-hash: 5c4499b4f7 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"a4318619-3885-47fa-ba7c-dae38a6547ba"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-17T17:34:28Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-17T17:34:28Z" name: console-5c4499b4f7 namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: a4318619-3885-47fa-ba7c-dae38a6547ba resourceVersion: "13387" uid: e69c8236-418a-484f-891f-88048e64a364 spec: replicas: 0 selector: matchLabels: app: console component: ui pod-template-hash: 5c4499b4f7 template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "11131" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8350" console.openshift.io/trusted-ca-config-version: "8378" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: 5c4499b4f7 name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /etc/pki/ca-trust/extracted/pem name: trusted-ca-bundle readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle name: trusted-ca-bundle - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "8346" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8347" console.openshift.io/trusted-ca-config-version: "8349" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "1" operator.openshift.io/spec-hash: 22cb755c109e4c5d9f9f6d74f99498465094d76ac91b591a4bb54b3f3ed68d94 creationTimestamp: "2026-04-17T17:27:38Z" generation: 2 labels: app: console component: ui pod-template-hash: 66d8c9c64d managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"a4318619-3885-47fa-ba7c-dae38a6547ba"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-17T17:27:56Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-17T17:27:56Z" name: console-66d8c9c64d namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: a4318619-3885-47fa-ba7c-dae38a6547ba resourceVersion: "9246" uid: 2899e46b-3d36-47f2-97ac-fd8b2baac66a spec: replicas: 0 selector: matchLabels: app: console component: ui pod-template-hash: 66d8c9c64d template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "8346" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8347" console.openshift.io/trusted-ca-config-version: "8349" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: 66d8c9c64d name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "13266" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8350" console.openshift.io/trusted-ca-config-version: "8378" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "6" operator.openshift.io/spec-hash: e5069373d9f39a9612f115f702217d71f50bcb9c4be67ae9d5a966781c75d3ac creationTimestamp: "2026-04-17T17:34:18Z" generation: 1 labels: app: console component: ui pod-template-hash: 78565777f8 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"a4318619-3885-47fa-ba7c-dae38a6547ba"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-17T17:34:18Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:availableReplicas: {} f:fullyLabeledReplicas: {} f:observedGeneration: {} f:readyReplicas: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-17T17:34:28Z" name: console-78565777f8 namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: a4318619-3885-47fa-ba7c-dae38a6547ba resourceVersion: "13376" uid: 83c3e26c-4955-44f9-b25b-2b1032851ec9 spec: replicas: 1 selector: matchLabels: app: console component: ui pod-template-hash: 78565777f8 template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "13266" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8350" console.openshift.io/trusted-ca-config-version: "8378" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: 78565777f8 name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /etc/pki/ca-trust/extracted/pem name: trusted-ca-bundle readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle name: trusted-ca-bundle - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: availableReplicas: 1 fullyLabeledReplicas: 1 observedGeneration: 1 readyReplicas: 1 replicas: 1 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "8346" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8350" console.openshift.io/trusted-ca-config-version: "8378" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "2" operator.openshift.io/spec-hash: 3d33c388b0914dbf097e3959c19c127df8ac6789a683927c6da4afeb927dd484 creationTimestamp: "2026-04-17T17:27:48Z" generation: 2 labels: app: console component: ui pod-template-hash: 7f76f5bff9 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"a4318619-3885-47fa-ba7c-dae38a6547ba"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-17T17:28:06Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-17T17:28:06Z" name: console-7f76f5bff9 namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: a4318619-3885-47fa-ba7c-dae38a6547ba resourceVersion: "9707" uid: 96231176-b72a-4c6e-8883-e319afdf9de9 spec: replicas: 0 selector: matchLabels: app: console component: ui pod-template-hash: 7f76f5bff9 template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "8346" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8350" console.openshift.io/trusted-ca-config-version: "8378" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: 7f76f5bff9 name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /etc/pki/ca-trust/extracted/pem name: trusted-ca-bundle readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle name: trusted-ca-bundle - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "10681" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8350" console.openshift.io/trusted-ca-config-version: "8378" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "4" operator.openshift.io/spec-hash: e41d531b610cf34605553c6cc0ec0c6e8bb75dc899ef5d8bf737098c9d888351 creationTimestamp: "2026-04-17T17:29:13Z" generation: 2 labels: app: console component: ui pod-template-hash: 86c9487b9d managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"a4318619-3885-47fa-ba7c-dae38a6547ba"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-17T17:30:40Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-17T17:30:40Z" name: console-86c9487b9d namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: a4318619-3885-47fa-ba7c-dae38a6547ba resourceVersion: "11243" uid: cc049bf3-022b-4a2e-a208-5f1ec39ea6f7 spec: replicas: 0 selector: matchLabels: app: console component: ui pod-template-hash: 86c9487b9d template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "10681" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8350" console.openshift.io/trusted-ca-config-version: "8378" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: 86c9487b9d name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /etc/pki/ca-trust/extracted/pem name: trusted-ca-bundle readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle name: trusted-ca-bundle - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "9226" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8350" console.openshift.io/trusted-ca-config-version: "8378" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "3" operator.openshift.io/spec-hash: 4d53adf3d34e14942b8376b0abd96b471618cf998cebe9ed3e4a509502c41d19 creationTimestamp: "2026-04-17T17:27:56Z" generation: 3 labels: app: console component: ui pod-template-hash: 8bf588c6c managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"a4318619-3885-47fa-ba7c-dae38a6547ba"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-17T17:29:23Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-17T17:29:23Z" name: console-8bf588c6c namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: a4318619-3885-47fa-ba7c-dae38a6547ba resourceVersion: "10826" uid: 372f395c-2f29-48a4-9e0d-0bb11ba1ec56 spec: replicas: 0 selector: matchLabels: app: console component: ui pod-template-hash: 8bf588c6c template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "7936" console.openshift.io/console-config-version: "9226" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1431" console.openshift.io/oauth-secret-version: "7942" console.openshift.io/proxy-config-version: "1439" console.openshift.io/service-ca-config-version: "8350" console.openshift.io/trusted-ca-config-version: "8378" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: 8bf588c6c name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /etc/pki/ca-trust/extracted/pem name: trusted-ca-bundle readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle name: trusted-ca-bundle - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "1" operator.openshift.io/spec-hash: f2f04305dcb6a10d0830dea013d745f7cc10b7e94419ded371769f31d01cffd7 creationTimestamp: "2026-04-17T17:27:36Z" generation: 1 labels: app: console component: downloads pod-template-hash: 6bcc868b7 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"444b18d3-7771-4045-ae68-eea9f9c5ef46"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"download-server"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8080,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: "2026-04-17T17:27:36Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:availableReplicas: {} f:fullyLabeledReplicas: {} f:observedGeneration: {} f:readyReplicas: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-17T17:27:55Z" name: downloads-6bcc868b7 namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: downloads uid: 444b18d3-7771-4045-ae68-eea9f9c5ef46 resourceVersion: "9209" uid: f2bf8bdc-0ce1-4d45-81c1-0dad4d8cbfe6 spec: replicas: 1 selector: matchLabels: app: console component: downloads pod-template-hash: 6bcc868b7 template: metadata: annotations: openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: downloads pod-template-hash: 6bcc868b7 name: downloads spec: affinity: {} containers: - args: - -c - "cat </tmp/serve.py\nimport errno, http.server, os, re, signal, socket, sys, tarfile, tempfile, threading, time, zipfile\n\ndef shutdown_handler(signum, frame):\n print(\"Received signal {}, shutting down...\".format(signum), flush=True)\n os._exit(0)\nsignal.signal(signal.SIGTERM, shutdown_handler)\n\ndef write_index(path, message):\n with open(path, 'wb') as f:\n f.write('\\n'.join([\n \ '',\n '',\n '',\n \ ' ',\n '',\n '',\n \ ' {}'.format(message),\n '',\n '',\n '',\n \ ]).encode('utf-8'))\n\n# Launch multiple listeners as threads\nclass Thread(threading.Thread):\n def __init__(self, i, socket):\n threading.Thread.__init__(self)\n \ self.i = i\n self.socket = socket\n self.daemon = True\n self.start()\n\n \ def run(self):\n server = http.server.SimpleHTTPRequestHandler\n \ server.server_version = \"OpenShift Downloads Server\"\n server.sys_version = \"\"\n httpd = http.server.HTTPServer(addr, server, False)\n\n # Prevent the HTTP server from re-binding every handler.\n # https://stackoverflow.com/questions/46210672/\n \ httpd.socket = self.socket\n httpd.server_bind = self.server_close = lambda self: None\n\n httpd.serve_forever()\n\nprint('Starting downloads server...', flush=True)\ntemp_dir = tempfile.mkdtemp()\nprint('Serving from: {}'.format(temp_dir), flush=True)\nos.chdir(temp_dir)\n\nprint('Creating arch directories...', flush=True)\nfor arch in ['amd64', 'arm64', 'ppc64le', 's390x']:\n os.mkdir(arch)\n\ncontent = ['license']\nprint('Creating license symlink...', flush=True)\nos.symlink('/usr/share/openshift/LICENSE', 'oc-license')\n\n# Function to create archives in background\ndef create_archives_async(arch, operating_system, path, basename, archive_path_root):\n try:\n print(' \ [Background] Creating archives for {} {}...'.format(arch, operating_system), flush=True)\n \n print(' [Background] Creating tar archive...', flush=True)\n with tarfile.open('{}.tar'.format(archive_path_root), 'w') as tar:\n tar.add(path, basename)\n \n print(' [Background] Creating zip archive...', flush=True)\n with zipfile.ZipFile('{}.zip'.format(archive_path_root), 'w') as zip:\n zip.write(path, basename)\n \n print(' [Background] Done with archives for {} {}'.format(arch, operating_system), flush=True)\n \ except Exception as e:\n print(' [Background] ERROR creating archives for {} {}: {}'.format(arch, operating_system, str(e)), flush=True)\n\nprint('Creating oc binary symlinks (archives will be created asynchronously)...', flush=True)\narchive_threads = []\n\nfor arch, operating_system, path in [\n ('amd64', 'linux', '/usr/share/openshift/linux_amd64/oc'),\n ('amd64', 'linux', '/usr/share/openshift/linux_amd64/oc.rhel8'),\n \ ('amd64', 'linux', '/usr/share/openshift/linux_amd64/oc.rhel9'),\n \ ('amd64', 'mac', '/usr/share/openshift/mac/oc'),\n ('amd64', 'windows', '/usr/share/openshift/windows/oc.exe'),\n ('arm64', 'linux', '/usr/share/openshift/linux_arm64/oc'),\n \ ('arm64', 'linux', '/usr/share/openshift/linux_arm64/oc.rhel8'),\n \ ('arm64', 'linux', '/usr/share/openshift/linux_arm64/oc.rhel9'),\n \ ('arm64', 'mac', '/usr/share/openshift/mac_arm64/oc'),\n ('ppc64le', 'linux', '/usr/share/openshift/linux_ppc64le/oc'),\n ('ppc64le', 'linux', '/usr/share/openshift/linux_ppc64le/oc.rhel8'),\n ('ppc64le', 'linux', '/usr/share/openshift/linux_ppc64le/oc.rhel9'),\n ('s390x', 'linux', '/usr/share/openshift/linux_s390x/oc'),\n ('s390x', 'linux', '/usr/share/openshift/linux_s390x/oc.rhel8'),\n \ ('s390x', 'linux', '/usr/share/openshift/linux_s390x/oc.rhel9'),\n \ ]:\n try:\n print(' Processing {} {} ({})...'.format(arch, operating_system, path), flush=True)\n \n # Check if source file exists\n if not os.path.exists(path):\n print(' WARNING: {} does not exist, skipping'.format(path), flush=True)\n continue\n \n file_size = os.path.getsize(path)\n \ print(' Source file size: {} MB'.format(file_size // (1024*1024)), flush=True)\n \n basename = os.path.basename(path)\n target_path = os.path.join(arch, operating_system, basename)\n \n print(' Creating directory...', flush=True)\n os.makedirs(os.path.join(arch, operating_system), exist_ok=True)\n \n print(' Creating symlink...', flush=True)\n \ os.symlink(path, target_path)\n \n # Only strip .exe extension, keep everything else (e.g., oc.rhel8 stays oc.rhel8)\n if basename.endswith('.exe'):\n \ base_root = basename[:-4]\n else:\n base_root = basename\n \ archive_path_root = os.path.join(arch, operating_system, base_root)\n \ \n # Start background thread to create archives\n archive_thread = threading.Thread(\n target=create_archives_async,\n args=(arch, operating_system, path, basename, archive_path_root),\n daemon=True\n \ )\n archive_thread.start()\n archive_threads.append(archive_thread)\n \ \n content.append(\n 'oc ({1} {2}) (tar zip)'.format(\n target_path, arch, operating_system, archive_path_root\n )\n )\n print(' \ Done with {} {} (archives creating in background)'.format(arch, operating_system), flush=True)\n except Exception as e:\n print(' ERROR processing {} {}: {}'.format(arch, operating_system, str(e)), flush=True)\n\nprint('All symlinks created. {} background threads creating archives...'.format(len(archive_threads)), flush=True)\n\nfor root, directories, filenames in os.walk(temp_dir):\n \ root_link = os.path.relpath(temp_dir, os.path.join(root, 'child')).replace(os.path.sep, '/')\n for directory in directories:\n write_index(\n path=os.path.join(root, directory, 'index.html'),\n message='

Directory listings are disabled. \ See here for available content.

'.format(root_link),\n \ )\n\nwrite_index(\n path=os.path.join(temp_dir, 'index.html'),\n \ message='\\n'.join(\n ['

Note: Archive files (.tar, .zip) are generated on server startup and may take a few moments to become available.

'] +\n ['']\n ),\n)\n\n# Create socket\n# IPv6 should handle IPv4 passively so long as it is not bound to a\n# specific address or set to IPv6_ONLY\n# https://stackoverflow.com/questions/25817848/python-3-does-http-server-support-ipv6\ntry:\n \ addr = ('::', 8080)\n sock = socket.socket(socket.AF_INET6, socket.SOCK_STREAM)\nexcept socket.error as err:\n # errno.EAFNOSUPPORT is \"socket.error: [Errno 97] Address family not supported by protocol\"\n # When IPv6 is disabled, socket will bind using IPv4.\n if err.errno == errno.EAFNOSUPPORT:\n \ addr = ('', 8080)\n sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n \ else:\n raise \nsock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)\nprint('Binding to {}...'.format(addr), flush=True)\nsock.bind(addr)\nsock.listen(5)\n\nprint('Starting 100 worker threads...', flush=True)\n[Thread(i, socket=sock) for i in range(100)]\nprint('Server ready on port 8080!', flush=True)\ntime.sleep(9e9)\nEOF\nexec python3 /tmp/serve.py\n" command: - /bin/sh image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7945fa555c35f23e52e2bfb6550375d92f5dff043ecca99b7aa3383339ba0d91 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: / port: 8080 scheme: HTTP periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: download-server ports: - containerPort: 8080 name: http protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: / port: 8080 scheme: HTTP periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 50Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError dnsPolicy: ClusterFirst nodeSelector: kubernetes.io/os: linux priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault terminationGracePeriodSeconds: 5 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 status: availableReplicas: 1 fullyLabeledReplicas: 1 observedGeneration: 1 readyReplicas: 1 replicas: 1 kind: ReplicaSetList metadata: resourceVersion: "21579"