--- apiVersion: v1 items: - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.132.0.8/23"],"mac_address":"0a:58:0a:84:00:08","gateway_ips":["10.132.0.1"],"routes":[{"dest":"10.132.0.0/14","nextHop":"10.132.0.1"},{"dest":"172.31.0.0/16","nextHop":"10.132.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.132.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.132.0.1"}],"ip_address":"10.132.0.8/23","gateway_ip":"10.132.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.132.0.8" ], "mac": "0a:58:0a:84:00:08", "default": true, "dns": {} }] openshift.io/required-scc: restricted-v2 openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default security.openshift.io/validated-scc-subject-type: user creationTimestamp: "2026-04-16T13:57:39Z" generateName: ingress-canary- generation: 1 labels: controller-revision-hash: 7b7bd94548 ingresscanary.operator.openshift.io/daemonset-ingresscanary: canary_controller pod-template-generation: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: ip-10-0-141-131 operation: Update subresource: status time: "2026-04-16T13:57:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:controller-revision-hash: {} f:ingresscanary.operator.openshift.io/daemonset-ingresscanary: {} f:pod-template-generation: {} f:ownerReferences: .: {} k:{"uid":"49ddb4b0-7456-4bab-918d-37e33c560c9f"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"serve-healthcheck-canary"}: .: {} f:command: {} f:env: .: {} k:{"name":"TLS_CERT"}: .: {} f:name: {} f:value: {} k:{"name":"TLS_KEY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} k:{"containerPort":8888,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/tls-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-04-16T13:57:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-04-16T14:01:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.132.0.8"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-04-16T14:01:52Z" name: ingress-canary-hgrw6 namespace: openshift-ingress-canary ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: ingress-canary uid: 49ddb4b0-7456-4bab-918d-37e33c560c9f resourceVersion: "10663" uid: b77dfd1a-6bd6-449b-8db3-c93ff41eb18e spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - ip-10-0-141-131.ec2.internal containers: - command: - ingress-operator - serve-healthcheck env: - name: TLS_CERT value: /etc/tls-cert/tls.crt - name: TLS_KEY value: /etc/tls-cert/tls.key image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:83b8b27a4ece9c91f6d77b2879e017af6b6daf3b91c0621c1f68a3b83fcc048c imagePullPolicy: IfNotPresent name: serve-healthcheck-canary ports: - containerPort: 8443 protocol: TCP - containerPort: 8888 protocol: TCP resources: requests: cpu: 10m memory: 20Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000320000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/tls-cert name: cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-69nfj readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: default-dockercfg-mv45m nodeName: ip-10-0-141-131.ec2.internal nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 2000000000 priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000320000 runAsNonRoot: true seLinuxOptions: level: s0:c18,c7 seccompProfile: type: RuntimeDefault serviceAccount: default serviceAccountName: default terminationGracePeriodSeconds: 30 tolerations: - key: node-role.kubernetes.io/infra operator: Exists - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists - effect: NoSchedule key: node.kubernetes.io/disk-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/pid-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/unschedulable operator: Exists volumes: - name: cert secret: defaultMode: 272 secretName: canary-serving-cert - name: kube-api-access-69nfj projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-04-16T14:01:52Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-04-16T13:57:39Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-04-16T14:01:52Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-04-16T14:01:52Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-04-16T13:57:39Z" status: "True" type: PodScheduled containerStatuses: - allocatedResources: cpu: 10m memory: 20Mi containerID: cri-o://5ac0f81fdc9038906ffe820eac5349a07ceda002315acb0fe95a9ab0075a4ab9 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:83b8b27a4ece9c91f6d77b2879e017af6b6daf3b91c0621c1f68a3b83fcc048c imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:83b8b27a4ece9c91f6d77b2879e017af6b6daf3b91c0621c1f68a3b83fcc048c lastState: {} name: serve-healthcheck-canary ready: true resources: requests: cpu: 10m memory: 20Mi restartCount: 0 started: true state: running: startedAt: "2026-04-16T14:01:51Z" user: linux: gid: 0 supplementalGroups: - 0 - 1000320000 uid: 1000320000 volumeMounts: - mountPath: /etc/tls-cert name: cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-69nfj readOnly: true recursiveReadOnly: Disabled hostIP: 10.0.141.131 hostIPs: - ip: 10.0.141.131 phase: Running podIP: 10.132.0.8 podIPs: - ip: 10.132.0.8 qosClass: Burstable startTime: "2026-04-16T13:57:39Z" - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.134.0.6/23"],"mac_address":"0a:58:0a:86:00:06","gateway_ips":["10.134.0.1"],"routes":[{"dest":"10.132.0.0/14","nextHop":"10.134.0.1"},{"dest":"172.31.0.0/16","nextHop":"10.134.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.134.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.134.0.1"}],"ip_address":"10.134.0.6/23","gateway_ip":"10.134.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.134.0.6" ], "mac": "0a:58:0a:86:00:06", "default": true, "dns": {} }] openshift.io/required-scc: restricted-v2 openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default security.openshift.io/validated-scc-subject-type: user creationTimestamp: "2026-04-16T13:57:50Z" generateName: ingress-canary- generation: 1 labels: controller-revision-hash: 7b7bd94548 ingresscanary.operator.openshift.io/daemonset-ingresscanary: canary_controller pod-template-generation: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: ip-10-0-131-61 operation: Update subresource: status time: "2026-04-16T13:57:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:controller-revision-hash: {} f:ingresscanary.operator.openshift.io/daemonset-ingresscanary: {} f:pod-template-generation: {} f:ownerReferences: .: {} k:{"uid":"49ddb4b0-7456-4bab-918d-37e33c560c9f"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"serve-healthcheck-canary"}: .: {} f:command: {} f:env: .: {} k:{"name":"TLS_CERT"}: .: {} f:name: {} f:value: {} k:{"name":"TLS_KEY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} k:{"containerPort":8888,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/tls-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-04-16T13:57:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-04-16T13:59:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.134.0.6"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-04-16T14:00:01Z" name: ingress-canary-xdwfc namespace: openshift-ingress-canary ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: ingress-canary uid: 49ddb4b0-7456-4bab-918d-37e33c560c9f resourceVersion: "8082" uid: adf72fd1-6177-4cfa-a1c8-0b8bb22dba4d spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - ip-10-0-131-61.ec2.internal containers: - command: - ingress-operator - serve-healthcheck env: - name: TLS_CERT value: /etc/tls-cert/tls.crt - name: TLS_KEY value: /etc/tls-cert/tls.key image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:83b8b27a4ece9c91f6d77b2879e017af6b6daf3b91c0621c1f68a3b83fcc048c imagePullPolicy: IfNotPresent name: serve-healthcheck-canary ports: - containerPort: 8443 protocol: TCP - containerPort: 8888 protocol: TCP resources: requests: cpu: 10m memory: 20Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000320000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/tls-cert name: cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-54v56 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: default-dockercfg-mv45m nodeName: ip-10-0-131-61.ec2.internal nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 2000000000 priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000320000 runAsNonRoot: true seLinuxOptions: level: s0:c18,c7 seccompProfile: type: RuntimeDefault serviceAccount: default serviceAccountName: default terminationGracePeriodSeconds: 30 tolerations: - key: node-role.kubernetes.io/infra operator: Exists - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists - effect: NoSchedule key: node.kubernetes.io/disk-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/pid-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/unschedulable operator: Exists volumes: - name: cert secret: defaultMode: 272 secretName: canary-serving-cert - name: kube-api-access-54v56 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-04-16T14:00:01Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-04-16T13:57:50Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-04-16T14:00:01Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-04-16T14:00:01Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-04-16T13:57:50Z" status: "True" type: PodScheduled containerStatuses: - allocatedResources: cpu: 10m memory: 20Mi containerID: cri-o://bc502d10d20c04381a8fb7791391c8cda5eb39db4b5ba5ec3e91e95832574651 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:83b8b27a4ece9c91f6d77b2879e017af6b6daf3b91c0621c1f68a3b83fcc048c imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:83b8b27a4ece9c91f6d77b2879e017af6b6daf3b91c0621c1f68a3b83fcc048c lastState: {} name: serve-healthcheck-canary ready: true resources: requests: cpu: 10m memory: 20Mi restartCount: 0 started: true state: running: startedAt: "2026-04-16T14:00:00Z" user: linux: gid: 0 supplementalGroups: - 0 - 1000320000 uid: 1000320000 volumeMounts: - mountPath: /etc/tls-cert name: cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-54v56 readOnly: true recursiveReadOnly: Disabled hostIP: 10.0.131.61 hostIPs: - ip: 10.0.131.61 phase: Running podIP: 10.134.0.6 podIPs: - ip: 10.134.0.6 qosClass: Burstable startTime: "2026-04-16T13:57:50Z" - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.133.0.6/23"],"mac_address":"0a:58:0a:85:00:06","gateway_ips":["10.133.0.1"],"routes":[{"dest":"10.132.0.0/14","nextHop":"10.133.0.1"},{"dest":"172.31.0.0/16","nextHop":"10.133.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.133.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.133.0.1"}],"ip_address":"10.133.0.6/23","gateway_ip":"10.133.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.133.0.6" ], "mac": "0a:58:0a:85:00:06", "default": true, "dns": {} }] openshift.io/required-scc: restricted-v2 openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default security.openshift.io/validated-scc-subject-type: user creationTimestamp: "2026-04-16T13:57:45Z" generateName: ingress-canary- generation: 1 labels: controller-revision-hash: 7b7bd94548 ingresscanary.operator.openshift.io/daemonset-ingresscanary: canary_controller pod-template-generation: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: ip-10-0-136-114 operation: Update subresource: status time: "2026-04-16T13:57:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:controller-revision-hash: {} f:ingresscanary.operator.openshift.io/daemonset-ingresscanary: {} f:pod-template-generation: {} f:ownerReferences: .: {} k:{"uid":"49ddb4b0-7456-4bab-918d-37e33c560c9f"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"serve-healthcheck-canary"}: .: {} f:command: {} f:env: .: {} k:{"name":"TLS_CERT"}: .: {} f:name: {} f:value: {} k:{"name":"TLS_KEY"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} k:{"containerPort":8888,"protocol":"TCP"}: .: {} f:containerPort: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/tls-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} manager: kube-controller-manager operation: Update time: "2026-04-16T13:57:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-04-16T14:01:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.133.0.6"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-04-16T14:01:58Z" name: ingress-canary-xjpgz namespace: openshift-ingress-canary ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: ingress-canary uid: 49ddb4b0-7456-4bab-918d-37e33c560c9f resourceVersion: "10868" uid: 7ee1c9f7-5758-4734-a7b3-ea621cc6df95 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - ip-10-0-136-114.ec2.internal containers: - command: - ingress-operator - serve-healthcheck env: - name: TLS_CERT value: /etc/tls-cert/tls.crt - name: TLS_KEY value: /etc/tls-cert/tls.key image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:83b8b27a4ece9c91f6d77b2879e017af6b6daf3b91c0621c1f68a3b83fcc048c imagePullPolicy: IfNotPresent name: serve-healthcheck-canary ports: - containerPort: 8443 protocol: TCP - containerPort: 8888 protocol: TCP resources: requests: cpu: 10m memory: 20Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL runAsUser: 1000320000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/tls-cert name: cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-sxqrw readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: default-dockercfg-mv45m nodeName: ip-10-0-136-114.ec2.internal nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 2000000000 priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000320000 runAsNonRoot: true seLinuxOptions: level: s0:c18,c7 seccompProfile: type: RuntimeDefault serviceAccount: default serviceAccountName: default terminationGracePeriodSeconds: 30 tolerations: - key: node-role.kubernetes.io/infra operator: Exists - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists - effect: NoSchedule key: node.kubernetes.io/disk-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/pid-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/unschedulable operator: Exists volumes: - name: cert secret: defaultMode: 272 secretName: canary-serving-cert - name: kube-api-access-sxqrw projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-04-16T14:01:58Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-04-16T13:57:45Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-04-16T14:01:58Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-04-16T14:01:58Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-04-16T13:57:45Z" status: "True" type: PodScheduled containerStatuses: - allocatedResources: cpu: 10m memory: 20Mi containerID: cri-o://538fd68433485ace141e9f965e5863d82f97397f5c22206713d3da0765a15933 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:83b8b27a4ece9c91f6d77b2879e017af6b6daf3b91c0621c1f68a3b83fcc048c imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:83b8b27a4ece9c91f6d77b2879e017af6b6daf3b91c0621c1f68a3b83fcc048c lastState: {} name: serve-healthcheck-canary ready: true resources: requests: cpu: 10m memory: 20Mi restartCount: 0 started: true state: running: startedAt: "2026-04-16T14:01:58Z" user: linux: gid: 0 supplementalGroups: - 0 - 1000320000 uid: 1000320000 volumeMounts: - mountPath: /etc/tls-cert name: cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-sxqrw readOnly: true recursiveReadOnly: Disabled hostIP: 10.0.136.114 hostIPs: - ip: 10.0.136.114 phase: Running podIP: 10.133.0.6 podIPs: - ip: 10.133.0.6 qosClass: Burstable startTime: "2026-04-16T13:57:45Z" kind: PodList metadata: resourceVersion: "21641"