--- apiVersion: v1 items: - apiVersion: v1 count: 11 eventTime: null firstTimestamp: "2026-04-20T23:18:21Z" involvedObject: apiVersion: services.platform.opendatahub.io/v1alpha1 kind: Auth name: auth resourceVersion: "13751" uid: a77954b8-9851-41fc-9d96-635fa13a44e5 kind: Event lastTimestamp: "2026-04-20T23:18:29Z" message: 'failure deploying resource {map[apiVersion:rbac.authorization.k8s.io/v1 kind:Role metadata:map[annotations:map[platform.opendatahub.io/instance.generation:1 platform.opendatahub.io/instance.name:auth platform.opendatahub.io/instance.uid:a77954b8-9851-41fc-9d96-635fa13a44e5 platform.opendatahub.io/type:Open Data Hub platform.opendatahub.io/version:3.4.0-ea.1] labels:map[platform.opendatahub.io/part-of:auth] name:data-science-admingroup-role namespace:opendatahub ownerReferences:[map[apiVersion:services.platform.opendatahub.io/v1alpha1 blockOwnerDeletion:%!s(bool=true) controller:%!s(bool=true) kind:Auth name:auth uid:a77954b8-9851-41fc-9d96-635fa13a44e5]]] rules:[map[apiGroups:[services.platform.opendatahub.io] resources:[auths] verbs:[get list watch patch update]] map[apiGroups:[services.opendatahub.io] resources:[auths/status] verbs:[get]] map[apiGroups:[infrastructure.opendatahub.io] resources:[hardwareprofiles] verbs:[create get list watch patch update delete]] map[apiGroups:[route.openshift.io] resources:[routes] verbs:[get list watch]] map[apiGroups:[batch] resources:[cronjobs] verbs:[get update watch]] map[apiGroups:[image.openshift.io] resources:[imagestreams] verbs:[create get list patch update delete watch]] map[apiGroups:[build.openshift.io] resources:[builds buildconfigs] verbs:[list get watch]] map[apiGroups:[apps] resources:[deployments] verbs:[patch update]] map[apiGroups:[opendatahub.io] resources:[odhdashboardconfigs] verbs:[get list watch create update patch]] map[apiGroups:[dashboard.opendatahub.io] resources:[odhapplications odhdocuments] verbs:[get list watch]] map[apiGroups:[console.openshift.io] resources:[odhquickstarts] verbs:[get list watch]] map[apiGroups:[template.openshift.io] resources:[templates] verbs:[get list watch create patch update delete]] map[apiGroups:[serving.kserve.io] resources:[servingruntimes] verbs:[create]] map[apiGroups:[nim.opendatahub.io] resources:[accounts] verbs:[watch update get list create patch delete]] map[apiGroups:[] resourceNames:[tier-to-group-mapping] resources:[configmaps] verbs:[get list watch patch update]]]]}: apply failed rbac.authorization.k8s.io/v1, Kind=Role: unable to patch rbac.authorization.k8s.io/v1, Kind=Role opendatahub/data-science-admingroup-role: roles.rbac.authorization.k8s.io "data-science-admingroup-role" is forbidden: cannot set blockOwnerDeletion in this case because cannot find RESTMapping for APIVersion services.platform.opendatahub.io/v1alpha1 Kind Auth: no matches for kind "Auth" in version "services.platform.opendatahub.io/v1alpha1"' metadata: creationTimestamp: "2026-04-20T23:18:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: manager operation: Update time: "2026-04-20T23:18:29Z" name: auth.18a833e2a1eddde8 namespace: default resourceVersion: "14142" uid: d3858324-0853-462f-b743-fbbbc20f7bae reason: ProvisioningError reportingComponent: auth reportingInstance: "" source: component: auth type: Warning - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:25Z" involvedObject: kind: CertificateSigningRequest name: csr-j7qvc kind: Event lastTimestamp: "2026-04-20T23:12:25Z" message: CSR "csr-j7qvc" has been approved metadata: creationTimestamp: "2026-04-20T23:12:25Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: ovnkube-identity operation: Update time: "2026-04-20T23:12:25Z" name: csr-j7qvc.18a8338fdc31c4d0 namespace: default resourceVersion: "5568" uid: 0cd630e5-4008-4d72-818b-55b34f3c4bae reason: CSRApproved reportingComponent: ovnkube-csr-approver-controller reportingInstance: "" source: component: ovnkube-csr-approver-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:31Z" involvedObject: kind: CertificateSigningRequest name: csr-rrh85 kind: Event lastTimestamp: "2026-04-20T23:12:31Z" message: CSR "csr-rrh85" has been approved metadata: creationTimestamp: "2026-04-20T23:12:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: ovnkube-identity operation: Update time: "2026-04-20T23:12:31Z" name: csr-rrh85.18a8339121ffda31 namespace: default resourceVersion: "5631" uid: f9c2f846-10d3-446a-9f06-8ef06f7e0aa3 reason: CSRApproved reportingComponent: ovnkube-csr-approver-controller reportingInstance: "" source: component: ovnkube-csr-approver-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:13:13Z" involvedObject: kind: CertificateSigningRequest name: csr-tdknp kind: Event lastTimestamp: "2026-04-20T23:13:13Z" message: CSR "csr-tdknp" has been approved metadata: creationTimestamp: "2026-04-20T23:13:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: ovnkube-identity operation: Update time: "2026-04-20T23:13:13Z" name: csr-tdknp.18a8339ad5e2587c namespace: default resourceVersion: "7083" uid: 57dd5fd3-b166-418b-8f97-67b959cee73b reason: CSRApproved reportingComponent: ovnkube-csr-approver-controller reportingInstance: "" source: component: ovnkube-csr-approver-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:58Z" involvedObject: kind: CertificateSigningRequest name: csr-v5m9z kind: Event lastTimestamp: "2026-04-20T23:12:58Z" message: CSR "csr-v5m9z" has been approved metadata: creationTimestamp: "2026-04-20T23:12:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: ovnkube-identity operation: Update time: "2026-04-20T23:12:58Z" name: csr-v5m9z.18a833976a61ad6d namespace: default resourceVersion: "6470" uid: f81a0d41-21f6-48ed-8bb5-c41e3d612468 reason: CSRApproved reportingComponent: ovnkube-csr-approver-controller reportingInstance: "" source: component: ovnkube-csr-approver-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:13:39Z" involvedObject: kind: CertificateSigningRequest name: csr-z6pwt kind: Event lastTimestamp: "2026-04-20T23:13:39Z" message: CSR "csr-z6pwt" has been approved metadata: creationTimestamp: "2026-04-20T23:13:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: ovnkube-identity operation: Update time: "2026-04-20T23:13:39Z" name: csr-z6pwt.18a833a1079a1737 namespace: default resourceVersion: "8980" uid: a4db8f46-15ee-472c-9560-5420112099b1 reason: CSRApproved reportingComponent: ovnkube-csr-approver-controller reportingInstance: "" source: component: ovnkube-csr-approver-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:13:33Z" involvedObject: kind: CertificateSigningRequest name: csr-zjjtt kind: Event lastTimestamp: "2026-04-20T23:13:33Z" message: CSR "csr-zjjtt" has been approved metadata: creationTimestamp: "2026-04-20T23:13:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: ovnkube-identity operation: Update time: "2026-04-20T23:13:33Z" name: csr-zjjtt.18a8339f8dba1d29 namespace: default resourceVersion: "8544" uid: 5c0b4dbc-f8be-4545-a4e1-f1eaf29a0bf0 reason: CSRApproved reportingComponent: ovnkube-csr-approver-controller reportingInstance: "" source: component: ovnkube-csr-approver-controller type: Normal - apiVersion: v1 count: 11 eventTime: null firstTimestamp: "2026-04-20T23:18:21Z" involvedObject: apiVersion: services.platform.opendatahub.io/v1alpha1 kind: GatewayConfig name: default-gateway resourceVersion: "13667" uid: bb051ab6-f9ca-4dda-90df-e3915373ea56 kind: Event lastTimestamp: "2026-04-20T23:18:28Z" message: 'failed to create auth proxy secret: secrets "kube-auth-proxy-creds" is forbidden: cannot set blockOwnerDeletion in this case because cannot find RESTMapping for APIVersion services.platform.opendatahub.io/v1alpha1 Kind GatewayConfig: no matches for kind "GatewayConfig" in version "services.platform.opendatahub.io/v1alpha1"' metadata: creationTimestamp: "2026-04-20T23:18:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: manager operation: Update time: "2026-04-20T23:18:28Z" name: default-gateway.18a833e296100ae1 namespace: default resourceVersion: "14133" uid: 010a2ab2-203f-4d1a-a6df-e1e475f12c2c reason: ProvisioningError reportingComponent: gatewayconfig reportingInstance: "" source: component: gatewayconfig type: Warning - apiVersion: v1 count: 4 eventTime: null firstTimestamp: "2026-04-20T23:18:33Z" involvedObject: apiVersion: services.platform.opendatahub.io/v1alpha1 kind: GatewayConfig name: default-gateway resourceVersion: "14353" uid: bb051ab6-f9ca-4dda-90df-e3915373ea56 kind: Event lastTimestamp: "2026-04-20T23:18:43Z" message: 'failed to lookup object openshift-ingress/data-science-tls-rule: no matches for kind "DestinationRule" in version "networking.istio.io/v1"' metadata: creationTimestamp: "2026-04-20T23:18:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: manager operation: Update time: "2026-04-20T23:18:43Z" name: default-gateway.18a833e573362996 namespace: default resourceVersion: "14539" uid: 86da8924-a1dd-4304-9ef2-b339154c4f0c reason: ProvisioningError reportingComponent: gatewayconfig reportingInstance: "" source: component: gatewayconfig type: Warning - apiVersion: v1 count: 13 eventTime: null firstTimestamp: "2026-04-20T23:18:32Z" involvedObject: apiVersion: components.platform.opendatahub.io/v1alpha1 kind: Kserve name: default-kserve resourceVersion: "14282" uid: dc2bb1f1-846f-4437-acab-faced86b330c kind: Event lastTimestamp: "2026-04-20T23:18:58Z" message: "failure deploying resource {map[apiVersion:serving.kserve.io/v1alpha1 kind:LLMInferenceServiceConfig metadata:map[annotations:map[internal.config.kubernetes.io/previousKinds:LLMInferenceServiceConfig internal.config.kubernetes.io/previousNames:kserve-config-llm-decode-template internal.config.kubernetes.io/previousNamespaces:opendatahub platform.opendatahub.io/instance.generation:1 platform.opendatahub.io/instance.name:default-kserve platform.opendatahub.io/instance.uid:dc2bb1f1-846f-4437-acab-faced86b330c platform.opendatahub.io/type:Open Data Hub platform.opendatahub.io/version:3.4.0-ea.1 serving.kserve.io/well-known-config:true] labels:map[app.kubernetes.io/part-of:kserve app.opendatahub.io/kserve:true platform.opendatahub.io/part-of:kserve] name:v3-4-0-ea-1-kserve-config-llm-decode-template namespace:opendatahub ownerReferences:[map[apiVersion:components.platform.opendatahub.io/v1alpha1 blockOwnerDeletion:%!s(bool=true) controller:%!s(bool=true) kind:Kserve name:default-kserve uid:dc2bb1f1-846f-4437-acab-faced86b330c]]] spec:map[template:map[containers:[map[args:[if [ \"$KSERVE_INFER_ROCE\" = \"true\" ]; then\n echo \"Trying to infer RoCE configs ... \"\n grep -H . /sys/class/infiniband/*/ports/*/gids/* 2>/dev/null\n grep -H . /sys/class/infiniband/*/ports/*/gid_attrs/types/* 2>/dev/null\n\n cat /proc/driver/nvidia/params\n\n \ KSERVE_INFER_IB_GID_INDEX_GREP=${KSERVE_INFER_IB_GID_INDEX_GREP:-\"RoCE v2\"}\n\n \ echo \"[Infer RoCE] Discovering active HCAs ...\"\n active_hcas=()\n # Loop through all mlx5 devices found in sysfs\n for hca_dir in /sys/class/infiniband/mlx5_*; do\n # Ensure it's a directory before proceeding\n if [ -d \"$hca_dir\" ]; then\n hca_name=$(basename \"$hca_dir\")\n port_state_file=\"$hca_dir/ports/1/state\" # Assume port 1\n type_file=\"$hca_dir/ports/1/gid_attrs/types/*\"\n\n \ echo \"[Infer RoCE] Check if the port state file ${port_state_file} exists and contains 'ACTIVE'\"\n if [ -f \"$port_state_file\" ] && grep -q \"ACTIVE\" \"$port_state_file\" && grep -q \"${KSERVE_INFER_IB_GID_INDEX_GREP}\" ${type_file} 2>/dev/null; then\n echo \"[Infer RoCE] Found active HCA: $hca_name\"\n active_hcas+=(\"$hca_name\")\n else\n \ echo \"[Infer RoCE] Skipping inactive or down HCA: $hca_name\"\n \ fi\n fi\n done\n\n ucx_hcas=()\n for hca in \"${active_hcas[@]}\"; do\n ucx_hcas+=(\"${hca}:1\")\n done\n\n # Check if we found any active HCAs\n \ if [ ${#active_hcas[@]} -gt 0 ]; then\n # Join the array elements with a comma\n hcas=$(IFS=,; echo \"${active_hcas[*]}\")\n echo \"[Infer RoCE] Setting active HCAs: ${hcas}\"\n export NCCL_IB_HCA=${NCCL_IB_HCA:-${hcas}}\n \ export NVSHMEM_HCA_LIST=${NVSHMEM_HCA_LIST:-${ucx_hcas}}\n export UCX_NET_DEVICES=${UCX_NET_DEVICES:-${ucx_hcas}}\n\n \ echo \"[Infer RoCE] NCCL_IB_HCA=${NCCL_IB_HCA}\"\n echo \"[Infer RoCE] NVSHMEM_HCA_LIST=${NVSHMEM_HCA_LIST}\"\n else\n echo \"[Infer RoCE] WARNING: No active RoCE HCAs found. NCCL_IB_HCA will not be set.\"\n fi\n\n if [ ${#active_hcas[@]} -gt 0 ]; then\n echo \"[Infer RoCE] Finding GID_INDEX for each active HCA (SR-IOV compatible)...\"\n\n # For SR-IOV environments, find the most common IPv4 RoCE v2 GID index across all HCAs\n declare -A gid_index_count\n declare -A hca_gid_index\n\n for hca_name in \"${active_hcas[@]}\"; do\n echo \"[Infer RoCE] Processing HCA: ${hca_name}\"\n\n # Find all RoCE v2 IPv4 GIDs for this HCA and count by index\n for tpath in /sys/class/infiniband/${hca_name}/ports/1/gid_attrs/types/*; do\n if grep -q \"${KSERVE_INFER_IB_GID_INDEX_GREP}\" \"$tpath\" 2>/dev/null; then\n idx=$(basename \"$tpath\")\n gid_file=\"/sys/class/infiniband/${hca_name}/ports/1/gids/${idx}\"\n \ # Check for IPv4 GID (contains ffff:)\n if [ -f \"$gid_file\" ] && grep -q \"ffff:\" \"$gid_file\"; then\n gid_value=$(cat \"$gid_file\" 2>/dev/null || echo \"\")\n echo \"[Infer RoCE] Found IPv4 RoCE v2 GID for ${hca_name}: index=${idx}, gid=${gid_value}\"\n hca_gid_index[\"${hca_name}\"]=\"${idx}\"\n \ gid_index_count[\"${idx}\"]=$((${gid_index_count[\"${idx}\"]} + 1))\n break # Use first found IPv4 GID per HCA\n fi\n \ fi\n done\n done\n\n # Find the most common GID index (most likely to be consistent across nodes)\n best_gid_index=\"\"\n \ max_count=0\n for idx in \"${!gid_index_count[@]}\"; do\n count=${gid_index_count[\"${idx}\"]}\n \ echo \"[Infer RoCE] GID_INDEX ${idx} found on ${count} HCAs\"\n if [ $count -gt $max_count ]; then\n max_count=$count\n best_gid_index=\"$idx\"\n \ fi\n done\n\n # Use deterministic fallback if counts are equal - prefer lower index number \n if [ ${#gid_index_count[@]} -gt 1 ]; then\n \ echo \"[Infer RoCE] Multiple GID indices found, selecting most common: ${best_gid_index}\"\n # If there's a tie, prefer index 3 as it's most common in SR-IOV setups\n if [ -n \"${gid_index_count['3']}\" ] && [ \"${gid_index_count['3']}\" -eq \"$max_count\" ]; then\n best_gid_index=\"3\"\n \ echo \"[Infer RoCE] Using deterministic fallback: GID_INDEX=3 (SR-IOV standard)\"\n fi\n fi\n\n # Check if GID_INDEX is already set via environment variables\n if [ -n \"${NCCL_IB_GID_INDEX}\" ]; then\n echo \"[Infer RoCE] Using pre-configured NCCL_IB_GID_INDEX=${NCCL_IB_GID_INDEX} from environment\"\n export NVSHMEM_IB_GID_INDEX=${NVSHMEM_IB_GID_INDEX:-$NCCL_IB_GID_INDEX}\n \ export UCX_IB_GID_INDEX=${UCX_IB_GID_INDEX:-$NCCL_IB_GID_INDEX}\n echo \"[Infer RoCE] Using hardcoded GID_INDEX=${NCCL_IB_GID_INDEX} for NCCL, NVSHMEM, and UCX\"\n elif [ -n \"$best_gid_index\" ]; then\n echo \"[Infer RoCE] Selected GID_INDEX: ${best_gid_index} (found on ${max_count} HCAs)\"\n\n \ export NCCL_IB_GID_INDEX=${NCCL_IB_GID_INDEX:-$best_gid_index}\n export NVSHMEM_IB_GID_INDEX=${NVSHMEM_IB_GID_INDEX:-$best_gid_index}\n export UCX_IB_GID_INDEX=${UCX_IB_GID_INDEX:-$best_gid_index}\n\n echo \"[Infer RoCE] Exported GID_INDEX=${best_gid_index} for NCCL, NVSHMEM, and UCX\"\n else\n \ echo \"[Infer RoCE] ERROR: No valid IPv4 ${KSERVE_INFER_IB_GID_INDEX_GREP} GID_INDEX found on any HCA.\"\n fi\n else\n echo \"[Infer RoCE] No active HCAs found, skipping GID_INDEX inference.\"\n fi\nfi\n\neval \"vllm serve /mnt/models \\\n --served-model-name \"{{ .Spec.Model.Name }}\" \\\n --port 8001 \\\n ${VLLM_ADDITIONAL_ARGS} \\\n --enable-ssl-refresh \\\n --ssl-certfile /var/run/kserve/tls/tls.crt \\\n --ssl-keyfile /var/run/kserve/tls/tls.key\"] command:[/bin/bash -c] env:[map[name:HOME value:/home] map[name:VLLM_LOGGING_LEVEL value:INFO] map[name:HF_HUB_CACHE value:/models]] image:registry.redhat.io/rhaiis/vllm-cuda-rhel9@sha256:fc68d623d1bfc36c8cb2fe4a71f19c8578cfb420ce8ce07b20a02c1ee0be0cf3 imagePullPolicy:IfNotPresent livenessProbe:map[failureThreshold:%!s(int64=3) httpGet:map[path:/health port:%!s(int64=8001) scheme:HTTPS] initialDelaySeconds:%!s(int64=120) periodSeconds:%!s(int64=10) timeoutSeconds:%!s(int64=10)] name:main ports:[map[containerPort:%!s(int64=8001) protocol:TCP]] readinessProbe:map[failureThreshold:%!s(int64=60) httpGet:map[path:/health port:%!s(int64=8001) scheme:HTTPS] initialDelaySeconds:%!s(int64=10) periodSeconds:%!s(int64=10) timeoutSeconds:%!s(int64=5)] securityContext:map[allowPrivilegeEscalation:%!s(bool=false) capabilities:map[drop:[ALL]] readOnlyRootFilesystem:%!s(bool=false) runAsNonRoot:%!s(bool=true) seccompProfile:map[type:RuntimeDefault]] terminationMessagePath:/dev/termination-log terminationMessagePolicy:FallbackToLogsOnError volumeMounts:[map[mountPath:/home name:home] map[mountPath:/dev/shm name:dshm] map[mountPath:/models name:model-cache] map[mountPath:/var/run/kserve/tls name:tls-certs readOnly:%!s(bool=true)]]]] initContainers:[map[args:[--port=8000 --vllm-port=8001 --connector=nixlv2 --secure-proxy=true --cert-path=/var/run/kserve/tls --decoder-use-tls=true --prefiller-use-tls=true --enable-ssrf-protection=true --pool-group=inference.networking.x-k8s.io] env:[map[name:INFERENCE_POOL_NAMESPACE valueFrom:map[fieldRef:map[fieldPath:metadata.namespace]]] map[name:SSL_CERT_DIR value:/var/run/kserve/tls:/var/run/secrets/kubernetes.io/serviceaccount:/etc/pki/tls/certs]] image:quay.io/opendatahub/llm-d-routing-sidecar:release-v0.4 imagePullPolicy:IfNotPresent livenessProbe:map[failureThreshold:%!s(int64=3) httpGet:map[path:/health port:%!s(int64=8000) scheme:HTTPS] initialDelaySeconds:%!s(int64=10) periodSeconds:%!s(int64=10) timeoutSeconds:%!s(int64=10)] name:llm-d-routing-sidecar ports:[map[containerPort:%!s(int64=8000) protocol:TCP]] readinessProbe:map[failureThreshold:%!s(int64=10) httpGet:map[path:/health port:%!s(int64=8000) scheme:HTTPS] initialDelaySeconds:%!s(int64=10) periodSeconds:%!s(int64=10) timeoutSeconds:%!s(int64=5)] resources:map[] restartPolicy:Always securityContext:map[allowPrivilegeEscalation:%!s(bool=false) capabilities:map[drop:[ALL]] readOnlyRootFilesystem:%!s(bool=false) runAsNonRoot:%!s(bool=true)] terminationMessagePath:/dev/termination-log terminationMessagePolicy:FallbackToLogsOnError volumeMounts:[map[mountPath:/var/run/kserve/tls name:tls-certs readOnly:%!s(bool=true)]]]] terminationGracePeriodSeconds:%!s(int64=30) volumes:[map[emptyDir:map[] name:home] map[emptyDir:map[medium:Memory sizeLimit:1Gi] name:dshm] map[emptyDir:map[] name:model-cache] map[name:tls-certs secret:map[secretName:{{ ChildName .ObjectMeta.Name `-kserve-self-signed-certs` }}]]]]]]}: apply failed serving.kserve.io/v1alpha1, Kind=LLMInferenceServiceConfig: unable to patch serving.kserve.io/v1alpha1, Kind=LLMInferenceServiceConfig opendatahub/v3-4-0-ea-1-kserve-config-llm-decode-template: Internal error occurred: failed calling webhook \"llminferenceserviceconfig.kserve-webhook-server.validator\": failed to call webhook: Post \"https://kserve-webhook-server-service.opendatahub.svc:443/validate-serving-kserve-io-v1alpha1-llminferenceserviceconfig?timeout=10s\": no endpoints available for service \"kserve-webhook-server-service\"" metadata: creationTimestamp: "2026-04-20T23:18:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: manager operation: Update time: "2026-04-20T23:18:58Z" name: default-kserve.18a833e518550600 namespace: default resourceVersion: "15243" uid: 4f615498-a15b-4ee0-9c8f-6f4af35b29c3 reason: ProvisioningError reportingComponent: kserve reportingInstance: "" source: component: kserve type: Warning - apiVersion: v1 count: 31 eventTime: null firstTimestamp: "2026-04-20T23:18:21Z" involvedObject: apiVersion: services.platform.opendatahub.io/v1alpha1 kind: Monitoring name: default-monitoring resourceVersion: "13635" uid: a72b81f7-5667-4f3f-bab8-78ea08abecbf kind: Event lastTimestamp: "2026-04-20T23:29:44Z" message: 'error fetching list of deployments: unable to list: opendatahub-monitoring because of unknown namespace for the cache' metadata: creationTimestamp: "2026-04-20T23:18:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: manager operation: Update time: "2026-04-20T23:29:44Z" name: default-monitoring.18a833e2903883c2 namespace: default resourceVersion: "27843" uid: 9dc3d3c9-508a-4cbc-a60b-0bf8ec294126 reason: ProvisioningError reportingComponent: monitoring reportingInstance: "" source: component: monitoring type: Warning - apiVersion: v1 count: 6 eventTime: null firstTimestamp: "2026-04-20T23:12:32Z" involvedObject: kind: Node name: ip-10-0-131-251.ec2.internal uid: ip-10-0-131-251.ec2.internal kind: Event lastTimestamp: "2026-04-20T23:12:32Z" message: 'Node ip-10-0-131-251.ec2.internal status is now: NodeHasSufficientMemory' metadata: creationTimestamp: "2026-04-20T23:12:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:reportingInstance: {} f:source: f:component: {} f:host: {} f:type: {} manager: kubelet operation: Update time: "2026-04-20T23:12:32Z" name: ip-10-0-131-251.ec2.internal.18a833916c0173aa namespace: default resourceVersion: "5725" uid: 773271ab-8637-4216-bcd9-7b6c10529f34 reason: NodeHasSufficientMemory reportingComponent: kubelet reportingInstance: ip-10-0-131-251.ec2.internal source: component: kubelet host: ip-10-0-131-251.ec2.internal type: Normal - apiVersion: v1 count: 6 eventTime: null firstTimestamp: "2026-04-20T23:12:32Z" involvedObject: kind: Node name: ip-10-0-131-251.ec2.internal uid: ip-10-0-131-251.ec2.internal kind: Event lastTimestamp: "2026-04-20T23:12:32Z" message: 'Node ip-10-0-131-251.ec2.internal status is now: NodeHasNoDiskPressure' metadata: creationTimestamp: "2026-04-20T23:12:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:reportingInstance: {} f:source: f:component: {} f:host: {} f:type: {} manager: kubelet operation: Update time: "2026-04-20T23:12:32Z" name: ip-10-0-131-251.ec2.internal.18a833916c01b52f namespace: default resourceVersion: "5727" uid: 93b9022e-4c3c-416c-8cc8-d487b461803a reason: NodeHasNoDiskPressure reportingComponent: kubelet reportingInstance: ip-10-0-131-251.ec2.internal source: component: kubelet host: ip-10-0-131-251.ec2.internal type: Normal - apiVersion: v1 count: 6 eventTime: null firstTimestamp: "2026-04-20T23:12:32Z" involvedObject: kind: Node name: ip-10-0-131-251.ec2.internal uid: ip-10-0-131-251.ec2.internal kind: Event lastTimestamp: "2026-04-20T23:12:32Z" message: 'Node ip-10-0-131-251.ec2.internal status is now: NodeHasSufficientPID' metadata: creationTimestamp: "2026-04-20T23:12:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:reportingInstance: {} f:source: f:component: {} f:host: {} f:type: {} manager: kubelet operation: Update time: "2026-04-20T23:12:33Z" name: ip-10-0-131-251.ec2.internal.18a833916c01d8b5 namespace: default resourceVersion: "5728" uid: a86a77d1-76b9-4b0c-8627-179272b0705d reason: NodeHasSufficientPID reportingComponent: kubelet reportingInstance: ip-10-0-131-251.ec2.internal source: component: kubelet host: ip-10-0-131-251.ec2.internal type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:32Z" involvedObject: kind: Node name: ip-10-0-131-251.ec2.internal uid: ip-10-0-131-251.ec2.internal kind: Event lastTimestamp: "2026-04-20T23:12:32Z" message: Updated Node Allocatable limit across pods metadata: creationTimestamp: "2026-04-20T23:12:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:reportingInstance: {} f:source: f:component: {} f:host: {} f:type: {} manager: kubelet operation: Update time: "2026-04-20T23:12:32Z" name: ip-10-0-131-251.ec2.internal.18a833916e59b8cc namespace: default resourceVersion: "5658" uid: d8b6a5b0-4efd-4340-901b-7347270c6646 reason: NodeAllocatableEnforced reportingComponent: kubelet reportingInstance: ip-10-0-131-251.ec2.internal source: component: kubelet host: ip-10-0-131-251.ec2.internal type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:33Z" involvedObject: apiVersion: v1 kind: Node name: ip-10-0-131-251.ec2.internal resourceVersion: "5659" uid: a8e2e601-b2ec-40d0-9c5e-a61404deecb6 kind: Event lastTimestamp: "2026-04-20T23:12:33Z" message: Node synced successfully metadata: creationTimestamp: "2026-04-20T23:12:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: aws-cloud-controller-manager operation: Update time: "2026-04-20T23:12:33Z" name: ip-10-0-131-251.ec2.internal.18a833918454d8a9 namespace: default resourceVersion: "5752" uid: cabc2414-c82d-40fd-ad95-e6242b880200 reason: Synced reportingComponent: cloud-node-controller reportingInstance: "" source: component: cloud-node-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:33Z" involvedObject: apiVersion: v1 kind: Node name: ip-10-0-131-251.ec2.internal uid: a8e2e601-b2ec-40d0-9c5e-a61404deecb6 kind: Event lastTimestamp: "2026-04-20T23:12:33Z" message: 'Node ip-10-0-131-251.ec2.internal event: Registered Node ip-10-0-131-251.ec2.internal in Controller' metadata: creationTimestamp: "2026-04-20T23:12:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: kube-controller-manager operation: Update time: "2026-04-20T23:12:33Z" name: ip-10-0-131-251.ec2.internal.18a833918f4d1182 namespace: default resourceVersion: "5780" uid: 9ff4c0b2-4db0-4501-b866-c9b7ebc092d3 reason: RegisteredNode reportingComponent: node-controller reportingInstance: "" source: component: node-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:13:08Z" involvedObject: apiVersion: v1 kind: Node name: ip-10-0-131-251.ec2.internal uid: a8e2e601-b2ec-40d0-9c5e-a61404deecb6 kind: Event lastTimestamp: "2026-04-20T23:13:08Z" message: 'Node ip-10-0-131-251.ec2.internal event: Registered Node ip-10-0-131-251.ec2.internal in Controller' metadata: creationTimestamp: "2026-04-20T23:13:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: kube-controller-manager operation: Update time: "2026-04-20T23:13:08Z" name: ip-10-0-131-251.ec2.internal.18a83399d660fe90 namespace: default resourceVersion: "6615" uid: 80159eb5-f915-4781-a0d9-9e0a3d51316f reason: RegisteredNode reportingComponent: node-controller reportingInstance: "" source: component: node-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:13:09Z" involvedObject: apiVersion: v1 kind: Node name: ip-10-0-131-251.ec2.internal resourceVersion: "6874" uid: a8e2e601-b2ec-40d0-9c5e-a61404deecb6 kind: Event lastTimestamp: "2026-04-20T23:13:09Z" message: '[k8s.ovn.org/node-chassis-id annotation not found for node ip-10-0-131-251.ec2.internal, error getting gateway config for node ip-10-0-131-251.ec2.internal: k8s.ovn.org/l3-gateway-config annotation not found for node "ip-10-0-131-251.ec2.internal", failed to update chassis to local for local node ip-10-0-131-251.ec2.internal, error: failed to parse node chassis-id for node - ip-10-0-131-251.ec2.internal, error: k8s.ovn.org/node-chassis-id annotation not found for node ip-10-0-131-251.ec2.internal]' metadata: creationTimestamp: "2026-04-20T23:13:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: ip-10-0-131-251 operation: Update time: "2026-04-20T23:13:09Z" name: ip-10-0-131-251.ec2.internal.18a8339a1ae20f79 namespace: default resourceVersion: "6885" uid: 58d82663-3f64-4b12-82e9-6dc724220e3d reason: ErrorAddingResource reportingComponent: ovnk-controlplane reportingInstance: "" source: component: ovnk-controlplane type: Warning - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:13:14Z" involvedObject: kind: Node name: ip-10-0-131-251.ec2.internal uid: ip-10-0-131-251.ec2.internal kind: Event lastTimestamp: "2026-04-20T23:13:14Z" message: 'Node ip-10-0-131-251.ec2.internal status is now: NodeReady' metadata: creationTimestamp: "2026-04-20T23:13:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:reportingInstance: {} f:source: f:component: {} f:host: {} f:type: {} manager: kubelet operation: Update time: "2026-04-20T23:13:14Z" name: ip-10-0-131-251.ec2.internal.18a8339b2808ac14 namespace: default resourceVersion: "7097" uid: f434e3f9-4c17-44ee-8f50-10122f472864 reason: NodeReady reportingComponent: kubelet reportingInstance: ip-10-0-131-251.ec2.internal source: component: kubelet host: ip-10-0-131-251.ec2.internal type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:13:10Z" involvedObject: apiVersion: v1 kind: Node name: ip-10-0-134-166.ec2.internal resourceVersion: "6897" uid: bb5e5ed6-1e33-4621-a3e3-6b737cf95aff kind: Event lastTimestamp: "2026-04-20T23:13:10Z" message: Node synced successfully metadata: creationTimestamp: "2026-04-20T23:13:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: aws-cloud-controller-manager operation: Update time: "2026-04-20T23:13:10Z" name: ip-10-0-134-166.ec2.internal.18a8339a5420087f namespace: default resourceVersion: "6976" uid: 840003c6-6ccb-4ab7-9bc6-8ae02b7dec86 reason: Synced reportingComponent: cloud-node-controller reportingInstance: "" source: component: cloud-node-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:13:13Z" involvedObject: apiVersion: v1 kind: Node name: ip-10-0-134-166.ec2.internal uid: bb5e5ed6-1e33-4621-a3e3-6b737cf95aff kind: Event lastTimestamp: "2026-04-20T23:13:13Z" message: 'Node ip-10-0-134-166.ec2.internal event: Registered Node ip-10-0-134-166.ec2.internal in Controller' metadata: creationTimestamp: "2026-04-20T23:13:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: kube-controller-manager operation: Update time: "2026-04-20T23:13:13Z" name: ip-10-0-134-166.ec2.internal.18a8339b02274bd3 namespace: default resourceVersion: "7090" uid: a03de23a-077b-44dd-a10b-9da782f81ec0 reason: RegisteredNode reportingComponent: node-controller reportingInstance: "" source: component: node-controller type: Normal - apiVersion: v1 count: 6 eventTime: null firstTimestamp: "2026-04-20T23:12:00Z" involvedObject: kind: Node name: ip-10-0-137-139.ec2.internal uid: ip-10-0-137-139.ec2.internal kind: Event lastTimestamp: "2026-04-20T23:12:00Z" message: 'Node ip-10-0-137-139.ec2.internal status is now: NodeHasSufficientMemory' metadata: creationTimestamp: "2026-04-20T23:12:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:reportingInstance: {} f:source: f:component: {} f:host: {} f:type: {} manager: kubelet operation: Update time: "2026-04-20T23:12:00Z" name: ip-10-0-137-139.ec2.internal.18a83389f3e68b42 namespace: default resourceVersion: "5192" uid: fbeaaa19-be89-4615-bbe4-2ac4d8cbe3ff reason: NodeHasSufficientMemory reportingComponent: kubelet reportingInstance: ip-10-0-137-139.ec2.internal source: component: kubelet host: ip-10-0-137-139.ec2.internal type: Normal - apiVersion: v1 count: 6 eventTime: null firstTimestamp: "2026-04-20T23:12:00Z" involvedObject: kind: Node name: ip-10-0-137-139.ec2.internal uid: ip-10-0-137-139.ec2.internal kind: Event lastTimestamp: "2026-04-20T23:12:00Z" message: 'Node ip-10-0-137-139.ec2.internal status is now: NodeHasNoDiskPressure' metadata: creationTimestamp: "2026-04-20T23:12:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:reportingInstance: {} f:source: f:component: {} f:host: {} f:type: {} manager: kubelet operation: Update time: "2026-04-20T23:12:00Z" name: ip-10-0-137-139.ec2.internal.18a83389f3e6dac3 namespace: default resourceVersion: "5198" uid: c8b3cac6-bb7a-485f-9b85-f82b7a615e78 reason: NodeHasNoDiskPressure reportingComponent: kubelet reportingInstance: ip-10-0-137-139.ec2.internal source: component: kubelet host: ip-10-0-137-139.ec2.internal type: Normal - apiVersion: v1 count: 6 eventTime: null firstTimestamp: "2026-04-20T23:12:00Z" involvedObject: kind: Node name: ip-10-0-137-139.ec2.internal uid: ip-10-0-137-139.ec2.internal kind: Event lastTimestamp: "2026-04-20T23:12:00Z" message: 'Node ip-10-0-137-139.ec2.internal status is now: NodeHasSufficientPID' metadata: creationTimestamp: "2026-04-20T23:12:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:reportingInstance: {} f:source: f:component: {} f:host: {} f:type: {} manager: kubelet operation: Update time: "2026-04-20T23:12:00Z" name: ip-10-0-137-139.ec2.internal.18a83389f3e6fdf2 namespace: default resourceVersion: "5199" uid: c7075aec-ef5c-4b3b-8811-891457f3f011 reason: NodeHasSufficientPID reportingComponent: kubelet reportingInstance: ip-10-0-137-139.ec2.internal source: component: kubelet host: ip-10-0-137-139.ec2.internal type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:00Z" involvedObject: kind: Node name: ip-10-0-137-139.ec2.internal uid: ip-10-0-137-139.ec2.internal kind: Event lastTimestamp: "2026-04-20T23:12:00Z" message: Updated Node Allocatable limit across pods metadata: creationTimestamp: "2026-04-20T23:12:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:reportingInstance: {} f:source: f:component: {} f:host: {} f:type: {} manager: kubelet operation: Update time: "2026-04-20T23:12:00Z" name: ip-10-0-137-139.ec2.internal.18a83389f6665a36 namespace: default resourceVersion: "5147" uid: cb5b80e2-c3b3-44a5-bf7f-e5a78b8f7508 reason: NodeAllocatableEnforced reportingComponent: kubelet reportingInstance: ip-10-0-137-139.ec2.internal source: component: kubelet host: ip-10-0-137-139.ec2.internal type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:01Z" involvedObject: apiVersion: v1 kind: Node name: ip-10-0-137-139.ec2.internal resourceVersion: "5150" uid: 433c581b-238c-4010-96e0-cc5c710b4a10 kind: Event lastTimestamp: "2026-04-20T23:12:01Z" message: Node synced successfully metadata: creationTimestamp: "2026-04-20T23:12:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: aws-cloud-controller-manager operation: Update time: "2026-04-20T23:12:01Z" name: ip-10-0-137-139.ec2.internal.18a8338a0edf5e9b namespace: default resourceVersion: "5225" uid: f9fd7617-52ea-4fec-9762-bf4b5576401d reason: Synced reportingComponent: cloud-node-controller reportingInstance: "" source: component: cloud-node-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:03Z" involvedObject: apiVersion: v1 kind: Node name: ip-10-0-137-139.ec2.internal uid: 433c581b-238c-4010-96e0-cc5c710b4a10 kind: Event lastTimestamp: "2026-04-20T23:12:03Z" message: 'Node ip-10-0-137-139.ec2.internal event: Registered Node ip-10-0-137-139.ec2.internal in Controller' metadata: creationTimestamp: "2026-04-20T23:12:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: kube-controller-manager operation: Update time: "2026-04-20T23:12:03Z" name: ip-10-0-137-139.ec2.internal.18a8338a92ea0973 namespace: default resourceVersion: "5316" uid: 00f5b117-db9d-4bbb-90ce-6cb3f04c1da2 reason: RegisteredNode reportingComponent: node-controller reportingInstance: "" source: component: node-controller type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:27Z" involvedObject: apiVersion: v1 kind: Node name: ip-10-0-137-139.ec2.internal resourceVersion: "5582" uid: 433c581b-238c-4010-96e0-cc5c710b4a10 kind: Event lastTimestamp: "2026-04-20T23:12:27Z" message: '[k8s.ovn.org/node-chassis-id annotation not found for node ip-10-0-137-139.ec2.internal, error getting gateway config for node ip-10-0-137-139.ec2.internal: k8s.ovn.org/l3-gateway-config annotation not found for node "ip-10-0-137-139.ec2.internal", failed to update chassis to local for local node ip-10-0-137-139.ec2.internal, error: failed to parse node chassis-id for node - ip-10-0-137-139.ec2.internal, error: k8s.ovn.org/node-chassis-id annotation not found for node ip-10-0-137-139.ec2.internal]' metadata: creationTimestamp: "2026-04-20T23:12:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: ip-10-0-137-139 operation: Update time: "2026-04-20T23:12:27Z" name: ip-10-0-137-139.ec2.internal.18a8339039257b4f namespace: default resourceVersion: "5584" uid: 7ca8b43b-b6d9-4172-b5cf-7a5007fd1f8b reason: ErrorAddingResource reportingComponent: ovnk-controlplane reportingInstance: "" source: component: ovnk-controlplane type: Warning - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:12:32Z" involvedObject: kind: Node name: ip-10-0-137-139.ec2.internal uid: ip-10-0-137-139.ec2.internal kind: Event lastTimestamp: "2026-04-20T23:12:32Z" message: 'Node ip-10-0-137-139.ec2.internal status is now: NodeReady' metadata: creationTimestamp: "2026-04-20T23:12:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:reportingInstance: {} f:source: f:component: {} f:host: {} f:type: {} manager: kubelet operation: Update time: "2026-04-20T23:12:32Z" name: ip-10-0-137-139.ec2.internal.18a833917721a14c namespace: default resourceVersion: "5681" uid: 86622a50-6468-463e-8fb2-3ad0a107f35c reason: NodeReady reportingComponent: kubelet reportingInstance: ip-10-0-137-139.ec2.internal source: component: kubelet host: ip-10-0-137-139.ec2.internal type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:13:08Z" involvedObject: apiVersion: v1 kind: Node name: ip-10-0-137-139.ec2.internal uid: 433c581b-238c-4010-96e0-cc5c710b4a10 kind: Event lastTimestamp: "2026-04-20T23:13:08Z" message: 'Node ip-10-0-137-139.ec2.internal event: Registered Node ip-10-0-137-139.ec2.internal in Controller' metadata: creationTimestamp: "2026-04-20T23:13:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: kube-controller-manager operation: Update time: "2026-04-20T23:13:08Z" name: ip-10-0-137-139.ec2.internal.18a83399d804cc9b namespace: default resourceVersion: "6634" uid: 97558366-a4a2-4878-aa3c-2ed9e8fd4c5e reason: RegisteredNode reportingComponent: node-controller reportingInstance: "" source: component: node-controller type: Normal - apiVersion: v1 count: 10 eventTime: null firstTimestamp: "2026-04-20T23:19:33Z" involvedObject: apiVersion: v1 kind: Namespace name: kuadrant-system resourceVersion: "16118" uid: a3af3745-c6d2-4052-82c8-9f766e21c314 kind: Event lastTimestamp: "2026-04-20T23:19:36Z" message: 'error using catalogsource kuadrant-system/kuadrant-operator-catalog: failed to list bundles: rpc error: code = Unavailable desc = connection error: desc = "error reading server preface: http2: frame too large"' metadata: creationTimestamp: "2026-04-20T23:19:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:count: {} f:firstTimestamp: {} f:involvedObject: {} f:lastTimestamp: {} f:message: {} f:reason: {} f:reportingComponent: {} f:source: f:component: {} f:type: {} manager: catalog operation: Update time: "2026-04-20T23:19:38Z" name: kuadrant-system.18a833f3675f47d7 namespace: default resourceVersion: "16361" uid: fef00cd5-5dcd-490e-8a95-618e8027a14b reason: ResolutionFailed reportingComponent: operator-lifecycle-manager reportingInstance: "" source: component: operator-lifecycle-manager type: Warning - apiVersion: v1 eventTime: null firstTimestamp: null involvedObject: apiVersion: v1 kind: Namespace name: kube-system namespace: default kind: Event lastTimestamp: null message: Received signal to terminate, becoming unready, but keeping serving metadata: creationTimestamp: "2026-04-20T23:12:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:involvedObject: {} f:message: {} f:reason: {} f:source: f:component: {} f:host: {} f:type: {} manager: openshift-apiserver operation: Update time: "2026-04-20T23:12:46Z" name: kube-system.18a83394bac3682d namespace: default resourceVersion: "6183" uid: 463b3bea-13b9-4ff7-a109-517be0b1158e reason: TerminationStart reportingComponent: "" reportingInstance: "" source: component: apiserver host: openshift-apiserver-6c7d57d9d4-6cf4j type: Normal - apiVersion: v1 eventTime: null firstTimestamp: null involvedObject: apiVersion: v1 kind: Namespace name: kube-system namespace: default kind: Event lastTimestamp: null message: The minimal shutdown duration of 15s finished metadata: creationTimestamp: "2026-04-20T23:13:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:involvedObject: {} f:message: {} f:reason: {} f:source: f:component: {} f:host: {} f:type: {} manager: openshift-apiserver operation: Update time: "2026-04-20T23:13:01Z" name: kube-system.18a833983922f848 namespace: default resourceVersion: "6521" uid: 740f8811-fba9-433d-98aa-b4c0a091385f reason: TerminationMinimalShutdownDurationFinished reportingComponent: "" reportingInstance: "" source: component: apiserver host: openshift-apiserver-6c7d57d9d4-6cf4j type: Normal - apiVersion: v1 eventTime: null firstTimestamp: null involvedObject: apiVersion: v1 kind: Namespace name: kube-system namespace: default kind: Event lastTimestamp: null message: Server has stopped listening metadata: creationTimestamp: "2026-04-20T23:13:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:involvedObject: {} f:message: {} f:reason: {} f:source: f:component: {} f:host: {} f:type: {} manager: openshift-apiserver operation: Update time: "2026-04-20T23:13:01Z" name: kube-system.18a83398397dffc8 namespace: default resourceVersion: "6522" uid: 5fd01e6d-aa55-456f-ac95-ecd8b6377e44 reason: TerminationStoppedServing reportingComponent: "" reportingInstance: "" source: component: apiserver host: openshift-apiserver-6c7d57d9d4-6cf4j type: Normal - apiVersion: v1 eventTime: null firstTimestamp: null involvedObject: apiVersion: v1 kind: Namespace name: kube-system namespace: default kind: Event lastTimestamp: null message: All pre-shutdown hooks have been finished metadata: creationTimestamp: "2026-04-20T23:13:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:involvedObject: {} f:message: {} f:reason: {} f:source: f:component: {} f:host: {} f:type: {} manager: openshift-apiserver operation: Update time: "2026-04-20T23:13:01Z" name: kube-system.18a8339839b86599 namespace: default resourceVersion: "6523" uid: a8f3633a-9489-4732-8cd5-8bc1a7290d87 reason: TerminationPreShutdownHooksFinished reportingComponent: "" reportingInstance: "" source: component: apiserver host: openshift-apiserver-6c7d57d9d4-6cf4j type: Normal - apiVersion: v1 eventTime: null firstTimestamp: null involvedObject: apiVersion: v1 kind: Namespace name: kube-system namespace: default kind: Event lastTimestamp: null message: All pending requests processed metadata: creationTimestamp: "2026-04-20T23:14:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:involvedObject: {} f:message: {} f:reason: {} f:source: f:component: {} f:host: {} f:type: {} manager: openshift-apiserver operation: Update time: "2026-04-20T23:14:01Z" name: kube-system.18a833a631d25cc0 namespace: default resourceVersion: "9464" uid: 53515735-0df2-4bee-a2e5-ffa6ab38d270 reason: TerminationGracefulTerminationFinished reportingComponent: "" reportingInstance: "" source: component: apiserver host: openshift-apiserver-6c7d57d9d4-6cf4j type: Normal - apiVersion: v1 count: 1 eventTime: null firstTimestamp: "2026-04-20T23:08:04Z" involvedObject: apiVersion: v1 kind: Namespace name: openshift-kube-apiserver namespace: default kind: Event lastTimestamp: "2026-04-20T23:08:04Z" message: readyz=true metadata: creationTimestamp: "2026-04-20T23:08:04Z" name: openshift-kube-apiserver.18a8335315f95caf namespace: default resourceVersion: "277" uid: 4b94fdb9-f3b1-432e-89dd-4e5b16123bf7 reason: KubeAPIReadyz reportingComponent: "" reportingInstance: "" source: component: apiserver host: kube-apiserver-67b5bb696c-xnc5l type: Warning kind: EventList metadata: resourceVersion: "30073"