--- apiVersion: admissionregistration.k8s.io/v1 kind: ValidatingAdmissionPolicy metadata: creationTimestamp: "2026-04-21T00:00:06Z" generation: 1 managedFields: - apiVersion: admissionregistration.k8s.io/v1 fieldsType: FieldsV1 fieldsV1: f:status: f:observedGeneration: {} f:typeChecking: {} manager: validatingadmissionpolicy-status operation: Apply subresource: status time: "2026-04-21T00:00:06Z" - apiVersion: admissionregistration.k8s.io/v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:ownerReferences: k:{"uid":"70e8f973-8b68-4e0d-b3a2-e2b46867e167"}: {} f:spec: f:failurePolicy: {} f:matchConstraints: {} f:validations: {} manager: cluster-network-operator/operconfig operation: Apply time: "2026-04-21T00:00:30Z" name: servicecidrs.openshift.io ownerReferences: - apiVersion: operator.openshift.io/v1 blockOwnerDeletion: true controller: true kind: Network name: cluster uid: 70e8f973-8b68-4e0d-b3a2-e2b46867e167 resourceVersion: "4356" uid: f4e9d0d5-11fd-47b6-887c-2a4817bcc4f9 spec: failurePolicy: Fail matchConstraints: matchPolicy: Equivalent namespaceSelector: {} objectSelector: {} resourceRules: - apiGroups: - networking.k8s.io apiVersions: - v1 operations: - CREATE - UPDATE resources: - servicecidrs scope: '*' validations: - expression: request.userInfo.username == 'system:apiserver' && 'system:masters' in request.userInfo.groups message: changing service CIDRs in a running cluster is not supported status: observedGeneration: 1 typeChecking: {}