--- apiVersion: apps/v1 items: - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "8813" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7418" console.openshift.io/trusted-ca-config-version: "7445" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "4" operator.openshift.io/spec-hash: 322c3b0850cfcb5bf2eef8ef45b36a86212ef22729434796e96f34ca79a196cb creationTimestamp: "2026-04-24T21:17:40Z" generation: 3 labels: app: console component: ui pod-template-hash: 6685fd9687 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"f52c4a74-9c13-406f-a800-556abc348633"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-24T21:19:00Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-24T21:19:00Z" name: console-6685fd9687 namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: f52c4a74-9c13-406f-a800-556abc348633 resourceVersion: "10362" uid: e66c0eba-ed8b-4cb4-aa13-9583b9f4d919 spec: replicas: 0 selector: matchLabels: app: console component: ui pod-template-hash: 6685fd9687 template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "8813" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7418" console.openshift.io/trusted-ca-config-version: "7445" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: 6685fd9687 name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /etc/pki/ca-trust/extracted/pem name: trusted-ca-bundle readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle name: trusted-ca-bundle - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "10167" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7418" console.openshift.io/trusted-ca-config-version: "7445" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "5" operator.openshift.io/spec-hash: 4d260f9967a50daf806717ed547fcf072d4448e0000892cf1fa40fa41593f456 creationTimestamp: "2026-04-24T21:18:49Z" generation: 2 labels: app: console component: ui pod-template-hash: 694db545b8 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"f52c4a74-9c13-406f-a800-556abc348633"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-24T21:22:56Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-24T21:22:56Z" name: console-694db545b8 namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: f52c4a74-9c13-406f-a800-556abc348633 resourceVersion: "14931" uid: 23556c21-e120-4e2b-9b56-24c327eb2e44 spec: replicas: 0 selector: matchLabels: app: console component: ui pod-template-hash: 694db545b8 template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "10167" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7418" console.openshift.io/trusted-ca-config-version: "7445" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: 694db545b8 name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /etc/pki/ca-trust/extracted/pem name: trusted-ca-bundle readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle name: trusted-ca-bundle - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "7414" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7418" console.openshift.io/trusted-ca-config-version: "7445" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "2" operator.openshift.io/spec-hash: 11f9f89cd03ca96c2670c732ee2bc800ec4629e583b3215bd1ccaba32ca98ccc creationTimestamp: "2026-04-24T21:17:27Z" generation: 2 labels: app: console component: ui pod-template-hash: 7b6d476f45 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"f52c4a74-9c13-406f-a800-556abc348633"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-24T21:17:33Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-24T21:17:33Z" name: console-7b6d476f45 namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: f52c4a74-9c13-406f-a800-556abc348633 resourceVersion: "8401" uid: c4b4041a-21a5-43fe-be8d-d65fff42a49c spec: replicas: 0 selector: matchLabels: app: console component: ui pod-template-hash: 7b6d476f45 template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "7414" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7418" console.openshift.io/trusted-ca-config-version: "7445" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: 7b6d476f45 name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /etc/pki/ca-trust/extracted/pem name: trusted-ca-bundle readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle name: trusted-ca-bundle - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "14175" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7418" console.openshift.io/trusted-ca-config-version: "7445" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "6" operator.openshift.io/spec-hash: 364b02e490f785ac5b5d6c17c434c03e20f7e61b2be6ef1bd02786a38f36239d creationTimestamp: "2026-04-24T21:22:45Z" generation: 1 labels: app: console component: ui pod-template-hash: 8c564f69f managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"f52c4a74-9c13-406f-a800-556abc348633"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-24T21:22:45Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:availableReplicas: {} f:fullyLabeledReplicas: {} f:observedGeneration: {} f:readyReplicas: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-24T21:22:56Z" name: console-8c564f69f namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: f52c4a74-9c13-406f-a800-556abc348633 resourceVersion: "14920" uid: 47d7d1a5-d8e7-47d6-9dd1-bc43d411f66a spec: replicas: 1 selector: matchLabels: app: console component: ui pod-template-hash: 8c564f69f template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "14175" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7418" console.openshift.io/trusted-ca-config-version: "7445" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: 8c564f69f name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /etc/pki/ca-trust/extracted/pem name: trusted-ca-bundle readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle name: trusted-ca-bundle - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: availableReplicas: 1 fullyLabeledReplicas: 1 observedGeneration: 1 readyReplicas: 1 replicas: 1 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "8377" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7418" console.openshift.io/trusted-ca-config-version: "7445" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "3" operator.openshift.io/spec-hash: 328bebe073795af2e4224d04327aba06526400e4888c5f3564c63311a3047ca5 creationTimestamp: "2026-04-24T21:17:33Z" generation: 3 labels: app: console component: ui pod-template-hash: b4fcd778d managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"f52c4a74-9c13-406f-a800-556abc348633"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/pki/ca-trust/extracted/pem"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:items: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-24T21:17:40Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-24T21:17:40Z" name: console-b4fcd778d namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: f52c4a74-9c13-406f-a800-556abc348633 resourceVersion: "8849" uid: 2d5c0685-af2c-47f8-9950-c22690113b11 spec: replicas: 0 selector: matchLabels: app: console component: ui pod-template-hash: b4fcd778d template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "8377" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7418" console.openshift.io/trusted-ca-config-version: "7445" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: b4fcd778d name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /etc/pki/ca-trust/extracted/pem name: trusted-ca-bundle readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 items: - key: ca-bundle.crt path: tls-ca-bundle.pem name: trusted-ca-bundle name: trusted-ca-bundle - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: observedGeneration: 3 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "7414" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7416" console.openshift.io/trusted-ca-config-version: "7417" deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "1" operator.openshift.io/spec-hash: 44a2888aed2760a1c6e2285a20100daff449fa2a9d85834b8286613068c15f80 creationTimestamp: "2026-04-24T21:17:18Z" generation: 2 labels: app: console component: ui pod-template-hash: d4f99bf67 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"f52c4a74-9c13-406f-a800-556abc348633"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:console.openshift.io/authn-ca-trust-config-version: {} f:console.openshift.io/console-config-version: {} f:console.openshift.io/image: {} f:console.openshift.io/infrastructure-config-version: {} f:console.openshift.io/oauth-secret-version: {} f:console.openshift.io/proxy-config-version: {} f:console.openshift.io/service-ca-config-version: {} f:console.openshift.io/trusted-ca-config-version: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"console"}: .: {} f:command: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} f:image: {} f:imagePullPolicy: {} f:lifecycle: .: {} f:preStop: .: {} f:exec: .: {} f:command: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:startupProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/var/console-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-config"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/oauth-serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/service-ca"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} f:dnsPolicy: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"console-config"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"console-oauth-config"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"console-serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"oauth-serving-cert"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} k:{"name":"service-ca"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-04-24T21:17:51Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-24T21:17:51Z" name: console-d4f99bf67 namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: console uid: f52c4a74-9c13-406f-a800-556abc348633 resourceVersion: "9536" uid: 8af6258c-863b-44c9-b1e1-272d5b759f0d spec: replicas: 0 selector: matchLabels: app: console component: ui pod-template-hash: d4f99bf67 template: metadata: annotations: console.openshift.io/authn-ca-trust-config-version: "6959" console.openshift.io/console-config-version: "7414" console.openshift.io/image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 console.openshift.io/infrastructure-config-version: "1483" console.openshift.io/oauth-secret-version: "6994" console.openshift.io/proxy-config-version: "1402" console.openshift.io/service-ca-config-version: "7416" console.openshift.io/trusted-ca-config-version: "7417" openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: ui pod-template-hash: d4f99bf67 name: console spec: affinity: {} containers: - command: - /opt/bridge/bin/bridge - --public-dir=/opt/bridge/static - --config=/var/console-config/console-config.yaml - --service-ca-file=/var/service-ca/service-ca.crt - --v=2 env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:d0cc2dc261f075be17ea31eb148cce7fc0b11a4dc06add53d19e4f39df155ba0 imagePullPolicy: IfNotPresent lifecycle: preStop: exec: command: - sleep - "25" livenessProbe: failureThreshold: 1 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 name: console ports: - containerPort: 8443 name: https protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false startupProbe: failureThreshold: 30 httpGet: path: /health port: 8443 scheme: HTTPS periodSeconds: 10 successThreshold: 1 timeoutSeconds: 10 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /var/serving-cert name: console-serving-cert readOnly: true - mountPath: /var/oauth-config name: console-oauth-config readOnly: true - mountPath: /var/console-config name: console-config readOnly: true - mountPath: /var/service-ca name: service-ca readOnly: true - mountPath: /var/oauth-serving-cert name: oauth-serving-cert readOnly: true dnsPolicy: ClusterFirst priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault serviceAccount: console serviceAccountName: console terminationGracePeriodSeconds: 40 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 volumes: - name: console-serving-cert secret: defaultMode: 420 secretName: console-serving-cert - name: console-oauth-config secret: defaultMode: 420 secretName: console-oauth-config - configMap: defaultMode: 420 name: console-config name: console-config - configMap: defaultMode: 420 name: service-ca name: service-ca - configMap: defaultMode: 420 name: oauth-serving-cert name: oauth-serving-cert status: observedGeneration: 2 replicas: 0 - apiVersion: apps/v1 kind: ReplicaSet metadata: annotations: deployment.kubernetes.io/desired-replicas: "1" deployment.kubernetes.io/max-replicas: "2" deployment.kubernetes.io/revision: "1" operator.openshift.io/spec-hash: f2f04305dcb6a10d0830dea013d745f7cc10b7e94419ded371769f31d01cffd7 creationTimestamp: "2026-04-24T21:17:16Z" generation: 1 labels: app: console component: downloads pod-template-hash: 6bcc868b7 managedFields: - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:deployment.kubernetes.io/desired-replicas: {} f:deployment.kubernetes.io/max-replicas: {} f:deployment.kubernetes.io/revision: {} f:operator.openshift.io/spec-hash: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"bc8ce3bf-dd0d-403a-8c3f-2a48936f433a"}: {} f:spec: f:replicas: {} f:selector: {} f:template: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:labels: .: {} f:app: {} f:component: {} f:pod-template-hash: {} f:name: {} f:spec: f:affinity: {} f:containers: k:{"name":"download-server"}: .: {} f:args: {} f:command: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:ports: .: {} k:{"containerPort":8080,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:readinessProbe: .: {} f:failureThreshold: {} f:httpGet: .: {} f:path: {} f:port: {} f:scheme: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:dnsPolicy: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} manager: kube-controller-manager operation: Update time: "2026-04-24T21:17:16Z" - apiVersion: apps/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:availableReplicas: {} f:fullyLabeledReplicas: {} f:observedGeneration: {} f:readyReplicas: {} f:replicas: {} manager: kube-controller-manager operation: Update subresource: status time: "2026-04-24T21:17:37Z" name: downloads-6bcc868b7 namespace: openshift-console ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: Deployment name: downloads uid: bc8ce3bf-dd0d-403a-8c3f-2a48936f433a resourceVersion: "8633" uid: 77baaa18-2dae-42ba-932e-b2ca56447a8c spec: replicas: 1 selector: matchLabels: app: console component: downloads pod-template-hash: 6bcc868b7 template: metadata: annotations: openshift.io/required-scc: restricted-v2 target.workload.openshift.io/management: '{"effect": "PreferredDuringScheduling"}' creationTimestamp: null labels: app: console component: downloads pod-template-hash: 6bcc868b7 name: downloads spec: affinity: {} containers: - args: - -c - "cat </tmp/serve.py\nimport errno, http.server, os, re, signal, socket, sys, tarfile, tempfile, threading, time, zipfile\n\ndef shutdown_handler(signum, frame):\n print(\"Received signal {}, shutting down...\".format(signum), flush=True)\n os._exit(0)\nsignal.signal(signal.SIGTERM, shutdown_handler)\n\ndef write_index(path, message):\n with open(path, 'wb') as f:\n f.write('\\n'.join([\n \ '',\n '',\n '',\n \ ' ',\n '',\n '',\n \ ' {}'.format(message),\n '',\n '',\n '',\n \ ]).encode('utf-8'))\n\n# Launch multiple listeners as threads\nclass Thread(threading.Thread):\n def __init__(self, i, socket):\n threading.Thread.__init__(self)\n \ self.i = i\n self.socket = socket\n self.daemon = True\n self.start()\n\n \ def run(self):\n server = http.server.SimpleHTTPRequestHandler\n \ server.server_version = \"OpenShift Downloads Server\"\n server.sys_version = \"\"\n httpd = http.server.HTTPServer(addr, server, False)\n\n # Prevent the HTTP server from re-binding every handler.\n # https://stackoverflow.com/questions/46210672/\n \ httpd.socket = self.socket\n httpd.server_bind = self.server_close = lambda self: None\n\n httpd.serve_forever()\n\nprint('Starting downloads server...', flush=True)\ntemp_dir = tempfile.mkdtemp()\nprint('Serving from: {}'.format(temp_dir), flush=True)\nos.chdir(temp_dir)\n\nprint('Creating arch directories...', flush=True)\nfor arch in ['amd64', 'arm64', 'ppc64le', 's390x']:\n os.mkdir(arch)\n\ncontent = ['license']\nprint('Creating license symlink...', flush=True)\nos.symlink('/usr/share/openshift/LICENSE', 'oc-license')\n\n# Function to create archives in background\ndef create_archives_async(arch, operating_system, path, basename, archive_path_root):\n try:\n print(' \ [Background] Creating archives for {} {}...'.format(arch, operating_system), flush=True)\n \n print(' [Background] Creating tar archive...', flush=True)\n with tarfile.open('{}.tar'.format(archive_path_root), 'w') as tar:\n tar.add(path, basename)\n \n print(' [Background] Creating zip archive...', flush=True)\n with zipfile.ZipFile('{}.zip'.format(archive_path_root), 'w') as zip:\n zip.write(path, basename)\n \n print(' [Background] Done with archives for {} {}'.format(arch, operating_system), flush=True)\n \ except Exception as e:\n print(' [Background] ERROR creating archives for {} {}: {}'.format(arch, operating_system, str(e)), flush=True)\n\nprint('Creating oc binary symlinks (archives will be created asynchronously)...', flush=True)\narchive_threads = []\n\nfor arch, operating_system, path in [\n ('amd64', 'linux', '/usr/share/openshift/linux_amd64/oc'),\n ('amd64', 'linux', '/usr/share/openshift/linux_amd64/oc.rhel8'),\n \ ('amd64', 'linux', '/usr/share/openshift/linux_amd64/oc.rhel9'),\n \ ('amd64', 'mac', '/usr/share/openshift/mac/oc'),\n ('amd64', 'windows', '/usr/share/openshift/windows/oc.exe'),\n ('arm64', 'linux', '/usr/share/openshift/linux_arm64/oc'),\n \ ('arm64', 'linux', '/usr/share/openshift/linux_arm64/oc.rhel8'),\n \ ('arm64', 'linux', '/usr/share/openshift/linux_arm64/oc.rhel9'),\n \ ('arm64', 'mac', '/usr/share/openshift/mac_arm64/oc'),\n ('ppc64le', 'linux', '/usr/share/openshift/linux_ppc64le/oc'),\n ('ppc64le', 'linux', '/usr/share/openshift/linux_ppc64le/oc.rhel8'),\n ('ppc64le', 'linux', '/usr/share/openshift/linux_ppc64le/oc.rhel9'),\n ('s390x', 'linux', '/usr/share/openshift/linux_s390x/oc'),\n ('s390x', 'linux', '/usr/share/openshift/linux_s390x/oc.rhel8'),\n \ ('s390x', 'linux', '/usr/share/openshift/linux_s390x/oc.rhel9'),\n \ ]:\n try:\n print(' Processing {} {} ({})...'.format(arch, operating_system, path), flush=True)\n \n # Check if source file exists\n if not os.path.exists(path):\n print(' WARNING: {} does not exist, skipping'.format(path), flush=True)\n continue\n \n file_size = os.path.getsize(path)\n \ print(' Source file size: {} MB'.format(file_size // (1024*1024)), flush=True)\n \n basename = os.path.basename(path)\n target_path = os.path.join(arch, operating_system, basename)\n \n print(' Creating directory...', flush=True)\n os.makedirs(os.path.join(arch, operating_system), exist_ok=True)\n \n print(' Creating symlink...', flush=True)\n \ os.symlink(path, target_path)\n \n # Only strip .exe extension, keep everything else (e.g., oc.rhel8 stays oc.rhel8)\n if basename.endswith('.exe'):\n \ base_root = basename[:-4]\n else:\n base_root = basename\n \ archive_path_root = os.path.join(arch, operating_system, base_root)\n \ \n # Start background thread to create archives\n archive_thread = threading.Thread(\n target=create_archives_async,\n args=(arch, operating_system, path, basename, archive_path_root),\n daemon=True\n \ )\n archive_thread.start()\n archive_threads.append(archive_thread)\n \ \n content.append(\n 'oc ({1} {2}) (tar zip)'.format(\n target_path, arch, operating_system, archive_path_root\n )\n )\n print(' \ Done with {} {} (archives creating in background)'.format(arch, operating_system), flush=True)\n except Exception as e:\n print(' ERROR processing {} {}: {}'.format(arch, operating_system, str(e)), flush=True)\n\nprint('All symlinks created. {} background threads creating archives...'.format(len(archive_threads)), flush=True)\n\nfor root, directories, filenames in os.walk(temp_dir):\n \ root_link = os.path.relpath(temp_dir, os.path.join(root, 'child')).replace(os.path.sep, '/')\n for directory in directories:\n write_index(\n path=os.path.join(root, directory, 'index.html'),\n message='

Directory listings are disabled. \ See here for available content.

'.format(root_link),\n \ )\n\nwrite_index(\n path=os.path.join(temp_dir, 'index.html'),\n \ message='\\n'.join(\n ['

Note: Archive files (.tar, .zip) are generated on server startup and may take a few moments to become available.

'] +\n ['']\n ),\n)\n\n# Create socket\n# IPv6 should handle IPv4 passively so long as it is not bound to a\n# specific address or set to IPv6_ONLY\n# https://stackoverflow.com/questions/25817848/python-3-does-http-server-support-ipv6\ntry:\n \ addr = ('::', 8080)\n sock = socket.socket(socket.AF_INET6, socket.SOCK_STREAM)\nexcept socket.error as err:\n # errno.EAFNOSUPPORT is \"socket.error: [Errno 97] Address family not supported by protocol\"\n # When IPv6 is disabled, socket will bind using IPv4.\n if err.errno == errno.EAFNOSUPPORT:\n \ addr = ('', 8080)\n sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)\n \ else:\n raise \nsock.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR, 1)\nprint('Binding to {}...'.format(addr), flush=True)\nsock.bind(addr)\nsock.listen(5)\n\nprint('Starting 100 worker threads...', flush=True)\n[Thread(i, socket=sock) for i in range(100)]\nprint('Server ready on port 8080!', flush=True)\ntime.sleep(9e9)\nEOF\nexec python3 /tmp/serve.py\n" command: - /bin/sh image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:7945fa555c35f23e52e2bfb6550375d92f5dff043ecca99b7aa3383339ba0d91 imagePullPolicy: IfNotPresent livenessProbe: failureThreshold: 3 httpGet: path: / port: 8080 scheme: HTTP periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: download-server ports: - containerPort: 8080 name: http protocol: TCP readinessProbe: failureThreshold: 3 httpGet: path: / port: 8080 scheme: HTTP periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 resources: requests: cpu: 10m memory: 50Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: false terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError dnsPolicy: ClusterFirst nodeSelector: kubernetes.io/os: linux priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: runAsNonRoot: true seccompProfile: type: RuntimeDefault terminationGracePeriodSeconds: 5 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 120 status: availableReplicas: 1 fullyLabeledReplicas: 1 observedGeneration: 1 readyReplicas: 1 replicas: 1 kind: ReplicaSetList metadata: resourceVersion: "48089"