--- apiVersion: v1 items: - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.132.0.12/23"],"mac_address":"0a:58:0a:84:00:0c","gateway_ips":["10.132.0.1"],"routes":[{"dest":"10.132.0.0/14","nextHop":"10.132.0.1"},{"dest":"172.31.0.0/16","nextHop":"10.132.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.132.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.132.0.1"}],"ip_address":"10.132.0.12/23","gateway_ip":"10.132.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.132.0.12" ], "mac": "0a:58:0a:84:00:0c", "default": true, "dns": {} }] openshift.io/required-scc: restricted-v2 openshift.io/scc: restricted-v2 seccomp.security.alpha.kubernetes.io/pod: runtime/default security.openshift.io/validated-scc-subject-type: user creationTimestamp: "2026-05-11T20:50:17Z" generateName: insights-operator-544c98cc96- generation: 1 labels: app: insights-operator pod-template-hash: 544c98cc96 managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:app: {} f:pod-template-hash: {} f:ownerReferences: .: {} k:{"uid":"7ea38b3d-b072-48c1-b7eb-f1ee0f5d8f25"}: {} f:spec: f:containers: k:{"name":"insights-operator"}: .: {} f:args: {} f:env: .: {} k:{"name":"POD_NAME"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"POD_NAMESPACE"}: .: {} f:name: {} f:valueFrom: .: {} f:fieldRef: {} k:{"name":"RELEASE_VERSION"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/tmp"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/lib/insights-operator"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/var/run/configmaps/service-ca-bundle"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/run/configmaps/trusted-ca-bundle"}: .: {} f:mountPath: {} f:name: {} f:readOnly: {} k:{"mountPath":"/var/run/secrets/serving-cert"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: .: {} f:runAsNonRoot: {} f:seccompProfile: .: {} f:type: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"service-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:optional: {} f:name: {} k:{"name":"serving-cert"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:optional: {} f:secretName: {} k:{"name":"snapshots"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"tmp"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"trusted-ca-bundle"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:optional: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-05-11T20:50:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: .: {} k:{"type":"PodScheduled"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:message: {} f:reason: {} f:status: {} f:type: {} manager: kube-scheduler operation: Update subresource: status time: "2026-05-11T20:50:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: ip-10-0-135-190 operation: Update subresource: status time: "2026-05-11T20:50:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-05-11T20:50:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.132.0.12"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-05-11T20:52:30Z" name: insights-operator-544c98cc96-j75m5 namespace: openshift-insights ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: ReplicaSet name: insights-operator-544c98cc96 uid: 7ea38b3d-b072-48c1-b7eb-f1ee0f5d8f25 resourceVersion: "9941" uid: 0311189e-d497-4d2c-a742-ad52f624750a spec: containers: - args: - start - --config=/etc/insights-operator/server.yaml env: - name: POD_NAME valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.name - name: POD_NAMESPACE valueFrom: fieldRef: apiVersion: v1 fieldPath: metadata.namespace - name: RELEASE_VERSION value: 4.20.21 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bdb236316fd4a57bb6ec0fe3d53a771fa2ad8029fed6d1c3c6460195cc189085 imagePullPolicy: IfNotPresent name: insights-operator ports: - containerPort: 8443 name: metrics protocol: TCP resources: requests: cpu: 10m memory: 54Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL readOnlyRootFilesystem: true runAsUser: 1000350000 terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /tmp name: tmp - mountPath: /var/lib/insights-operator name: snapshots - mountPath: /var/run/configmaps/trusted-ca-bundle name: trusted-ca-bundle readOnly: true - mountPath: /var/run/configmaps/service-ca-bundle name: service-ca-bundle readOnly: true - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-64xn7 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true imagePullSecrets: - name: operator-dockercfg-bwhrj nodeName: ip-10-0-135-190.ec2.internal nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 2000000000 priorityClassName: system-cluster-critical restartPolicy: Always schedulerName: default-scheduler securityContext: fsGroup: 1000350000 runAsNonRoot: true seLinuxOptions: level: s0:c19,c4 seccompProfile: type: RuntimeDefault serviceAccount: operator serviceAccountName: operator terminationGracePeriodSeconds: 30 tolerations: - effect: NoSchedule key: node-role.kubernetes.io/master operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists tolerationSeconds: 900 - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists tolerationSeconds: 900 - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists volumes: - emptyDir: {} name: tmp - emptyDir: {} name: snapshots - configMap: defaultMode: 420 name: trusted-ca-bundle optional: true name: trusted-ca-bundle - configMap: defaultMode: 420 name: service-ca-bundle optional: true name: service-ca-bundle - name: serving-cert secret: defaultMode: 420 optional: true secretName: openshift-insights-serving-cert - name: kube-api-access-64xn7 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-05-11T20:50:59Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-05-11T20:50:51Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-05-11T20:52:30Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-05-11T20:52:30Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-05-11T20:50:51Z" status: "True" type: PodScheduled containerStatuses: - allocatedResources: cpu: 10m memory: 54Mi containerID: cri-o://97e2a3805bf022c262fe3921655fc5a1b620b063479406cc5f1e258890c27de7 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:bdb236316fd4a57bb6ec0fe3d53a771fa2ad8029fed6d1c3c6460195cc189085 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:64713f69192ff34d3a1401827472bee51bfeed7d3c0ddffa609a622a9504723f lastState: terminated: containerID: cri-o://f8887b3666fe8266de153830d96f8133100cdbd8a5355dc938e53a65cf4a0f1b exitCode: 0 finishedAt: "2026-05-11T20:52:28Z" reason: Completed startedAt: "2026-05-11T20:50:58Z" name: insights-operator ready: true resources: requests: cpu: 10m memory: 54Mi restartCount: 1 started: true state: running: startedAt: "2026-05-11T20:52:29Z" user: linux: gid: 0 supplementalGroups: - 0 - 1000350000 uid: 1000350000 volumeMounts: - mountPath: /tmp name: tmp - mountPath: /var/lib/insights-operator name: snapshots - mountPath: /var/run/configmaps/trusted-ca-bundle name: trusted-ca-bundle readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/configmaps/service-ca-bundle name: service-ca-bundle readOnly: true recursiveReadOnly: Disabled - mountPath: /var/run/secrets/serving-cert name: serving-cert - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-64xn7 readOnly: true recursiveReadOnly: Disabled hostIP: 10.0.135.190 hostIPs: - ip: 10.0.135.190 phase: Running podIP: 10.132.0.12 podIPs: - ip: 10.132.0.12 qosClass: Burstable startTime: "2026-05-11T20:50:51Z" - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.133.0.14/23"],"mac_address":"0a:58:0a:85:00:0e","gateway_ips":["10.133.0.1"],"routes":[{"dest":"10.132.0.0/14","nextHop":"10.133.0.1"},{"dest":"172.31.0.0/16","nextHop":"10.133.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.133.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.133.0.1"}],"ip_address":"10.133.0.14/23","gateway_ip":"10.133.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.133.0.14" ], "mac": "0a:58:0a:85:00:0e", "default": true, "dns": {} }] openshift.io/required-scc: insights-runtime-extractor-scc openshift.io/scc: insights-runtime-extractor-scc seccomp.security.alpha.kubernetes.io/pod: runtime/default security.openshift.io/validated-scc-subject-type: serviceaccount creationTimestamp: "2026-05-11T20:51:24Z" generateName: insights-runtime-extractor- generation: 1 labels: app.kubernetes.io/name: insights-runtime-extractor controller-revision-hash: 848f6ff4db pod-template-generation: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: ip-10-0-128-58 operation: Update subresource: status time: "2026-05-11T20:51:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:controller-revision-hash: {} f:pod-template-generation: {} f:ownerReferences: .: {} k:{"uid":"e77570c0-d3ad-45dd-8417-0bd8a12db98b"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"exporter"}: .: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/data"}: .: {} f:mountPath: {} f:name: {} k:{"name":"extractor"}: .: {} f:env: .: {} k:{"name":"CONTAINER_RUNTIME_ENDPOINT"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:exec: .: {} f:command: {} f:failureThreshold: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:capabilities: .: {} f:add: {} f:drop: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/crio.sock"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/data"}: .: {} f:mountPath: {} f:name: {} k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:runAsNonRoot: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/kube-rbac-proxy"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/etc/tls/private"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:hostPID: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"crio-socket"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"data-volume"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"insights-runtime-extractor-tls"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"kube-rbac-proxy-cm"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-05-11T20:51:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-05-11T20:51:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.133.0.14"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-05-11T20:51:29Z" name: insights-runtime-extractor-9cp9w namespace: openshift-insights ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: insights-runtime-extractor uid: e77570c0-d3ad-45dd-8417-0bd8a12db98b resourceVersion: "7802" uid: 1a279daf-6a19-4521-916d-10598e20c36a spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - ip-10-0-128-58.ec2.internal containers: - args: - --secure-listen-address=:8443 - --upstream=http://127.0.0.1:8000 - --config-file=/etc/kube-rbac-proxy/config.yaml - --tls-cert-file=/etc/tls/private/tls.crt - --tls-private-key-file=/etc/tls/private/tls.key image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86f555058d2bb5395e2046e8ecb795f4fc82f5017072115e1a19a9b1ce910e75 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL privileged: false readOnlyRootFilesystem: true runAsNonRoot: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/tls/private name: insights-runtime-extractor-tls - mountPath: /etc/kube-rbac-proxy name: kube-rbac-proxy-cm - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-hlq5s readOnly: true - image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1c14048344094d80d8713c7d5f5cd9c7962fae58d4c9a2b740f376d44f7a3341 imagePullPolicy: Always name: exporter resources: requests: cpu: 10m memory: 200Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL privileged: false readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-hlq5s readOnly: true - env: - name: CONTAINER_RUNTIME_ENDPOINT value: unix:///crio.sock image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5df3298a46f3edc470924380d29bd1e74c956ca92ced3496318a6d9503ff3e99 imagePullPolicy: Always livenessProbe: exec: command: - crictl - --timeout - 10s - info failureThreshold: 3 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: extractor resources: requests: cpu: 10m memory: 200Mi securityContext: capabilities: add: - CAP_SYS_ADMIN drop: - ALL privileged: true readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /crio.sock name: crio-socket - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-hlq5s readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true hostPID: true imagePullSecrets: - name: insights-runtime-extractor-sa-dockercfg-s999c nodeName: ip-10-0-128-58.ec2.internal nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 1000000000 priorityClassName: openshift-user-critical restartPolicy: Always schedulerName: default-scheduler securityContext: seccompProfile: type: RuntimeDefault serviceAccount: insights-runtime-extractor-sa serviceAccountName: insights-runtime-extractor-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists - effect: NoSchedule key: node.kubernetes.io/disk-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/pid-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/unschedulable operator: Exists volumes: - hostPath: path: /run/crio/crio.sock type: Socket name: crio-socket - emptyDir: {} name: data-volume - configMap: defaultMode: 420 name: kube-rbac-proxy name: kube-rbac-proxy-cm - name: insights-runtime-extractor-tls secret: defaultMode: 420 secretName: insights-runtime-extractor-tls - name: kube-api-access-hlq5s projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:29Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:24Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:29Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:29Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:24Z" status: "True" type: PodScheduled containerStatuses: - allocatedResources: cpu: 10m memory: 200Mi containerID: cri-o://e843d88debc2644faf24e08f09051df89f2993d465983874dbaea7bb06ca1999 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1c14048344094d80d8713c7d5f5cd9c7962fae58d4c9a2b740f376d44f7a3341 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1c14048344094d80d8713c7d5f5cd9c7962fae58d4c9a2b740f376d44f7a3341 lastState: {} name: exporter ready: true resources: requests: cpu: 10m memory: 200Mi restartCount: 0 started: true state: running: startedAt: "2026-05-11T20:51:25Z" user: linux: gid: 0 supplementalGroups: - 0 uid: 0 volumeMounts: - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-hlq5s readOnly: true recursiveReadOnly: Disabled - allocatedResources: cpu: 10m memory: 200Mi containerID: cri-o://9ffdd4f874a9b49daab42a3382734a0632170f844b5475673f244f19a7c07104 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5df3298a46f3edc470924380d29bd1e74c956ca92ced3496318a6d9503ff3e99 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:34563584bcd354cbfbba08c46692d3d52b3e8f0fcdd866c96e1b342d155cabb3 lastState: {} name: extractor ready: true resources: requests: cpu: 10m memory: 200Mi restartCount: 0 started: true state: running: startedAt: "2026-05-11T20:51:29Z" user: linux: gid: 0 supplementalGroups: - 0 uid: 0 volumeMounts: - mountPath: /crio.sock name: crio-socket - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-hlq5s readOnly: true recursiveReadOnly: Disabled - allocatedResources: cpu: 10m memory: 100Mi containerID: cri-o://90d9d4be8bca77681d06a5374bb3fc6c1b0ae5741891ba889c64c8dabd8edb56 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86f555058d2bb5395e2046e8ecb795f4fc82f5017072115e1a19a9b1ce910e75 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:54d33b9efe0867328de774ed049be40275c0bf8fea65d4ac5b319e99e2374b0f lastState: {} name: kube-rbac-proxy ready: true resources: requests: cpu: 10m memory: 100Mi restartCount: 0 started: true state: running: startedAt: "2026-05-11T20:51:24Z" user: linux: gid: 65534 supplementalGroups: - 65534 uid: 65534 volumeMounts: - mountPath: /etc/tls/private name: insights-runtime-extractor-tls - mountPath: /etc/kube-rbac-proxy name: kube-rbac-proxy-cm - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-hlq5s readOnly: true recursiveReadOnly: Disabled hostIP: 10.0.128.58 hostIPs: - ip: 10.0.128.58 phase: Running podIP: 10.133.0.14 podIPs: - ip: 10.133.0.14 qosClass: Burstable startTime: "2026-05-11T20:51:24Z" - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.132.0.20/23"],"mac_address":"0a:58:0a:84:00:14","gateway_ips":["10.132.0.1"],"routes":[{"dest":"10.132.0.0/14","nextHop":"10.132.0.1"},{"dest":"172.31.0.0/16","nextHop":"10.132.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.132.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.132.0.1"}],"ip_address":"10.132.0.20/23","gateway_ip":"10.132.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.132.0.20" ], "mac": "0a:58:0a:84:00:14", "default": true, "dns": {} }] openshift.io/required-scc: insights-runtime-extractor-scc openshift.io/scc: insights-runtime-extractor-scc seccomp.security.alpha.kubernetes.io/pod: runtime/default security.openshift.io/validated-scc-subject-type: serviceaccount creationTimestamp: "2026-05-11T20:51:24Z" generateName: insights-runtime-extractor- generation: 1 labels: app.kubernetes.io/name: insights-runtime-extractor controller-revision-hash: 848f6ff4db pod-template-generation: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: ip-10-0-135-190 operation: Update subresource: status time: "2026-05-11T20:51:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:controller-revision-hash: {} f:pod-template-generation: {} f:ownerReferences: .: {} k:{"uid":"e77570c0-d3ad-45dd-8417-0bd8a12db98b"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"exporter"}: .: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/data"}: .: {} f:mountPath: {} f:name: {} k:{"name":"extractor"}: .: {} f:env: .: {} k:{"name":"CONTAINER_RUNTIME_ENDPOINT"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:exec: .: {} f:command: {} f:failureThreshold: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:capabilities: .: {} f:add: {} f:drop: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/crio.sock"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/data"}: .: {} f:mountPath: {} f:name: {} k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:runAsNonRoot: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/kube-rbac-proxy"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/etc/tls/private"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:hostPID: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"crio-socket"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"data-volume"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"insights-runtime-extractor-tls"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"kube-rbac-proxy-cm"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-05-11T20:51:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-05-11T20:51:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.132.0.20"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-05-11T20:51:34Z" name: insights-runtime-extractor-jjq7d namespace: openshift-insights ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: insights-runtime-extractor uid: e77570c0-d3ad-45dd-8417-0bd8a12db98b resourceVersion: "8088" uid: 36a1e166-0e33-4883-8711-cbbba5eb371c spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - ip-10-0-135-190.ec2.internal containers: - args: - --secure-listen-address=:8443 - --upstream=http://127.0.0.1:8000 - --config-file=/etc/kube-rbac-proxy/config.yaml - --tls-cert-file=/etc/tls/private/tls.crt - --tls-private-key-file=/etc/tls/private/tls.key image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86f555058d2bb5395e2046e8ecb795f4fc82f5017072115e1a19a9b1ce910e75 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL privileged: false readOnlyRootFilesystem: true runAsNonRoot: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/tls/private name: insights-runtime-extractor-tls - mountPath: /etc/kube-rbac-proxy name: kube-rbac-proxy-cm - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-7djb8 readOnly: true - image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1c14048344094d80d8713c7d5f5cd9c7962fae58d4c9a2b740f376d44f7a3341 imagePullPolicy: Always name: exporter resources: requests: cpu: 10m memory: 200Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL privileged: false readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-7djb8 readOnly: true - env: - name: CONTAINER_RUNTIME_ENDPOINT value: unix:///crio.sock image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5df3298a46f3edc470924380d29bd1e74c956ca92ced3496318a6d9503ff3e99 imagePullPolicy: Always livenessProbe: exec: command: - crictl - --timeout - 10s - info failureThreshold: 3 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: extractor resources: requests: cpu: 10m memory: 200Mi securityContext: capabilities: add: - CAP_SYS_ADMIN drop: - ALL privileged: true readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /crio.sock name: crio-socket - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-7djb8 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true hostPID: true imagePullSecrets: - name: insights-runtime-extractor-sa-dockercfg-s999c nodeName: ip-10-0-135-190.ec2.internal nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 1000000000 priorityClassName: openshift-user-critical restartPolicy: Always schedulerName: default-scheduler securityContext: seccompProfile: type: RuntimeDefault serviceAccount: insights-runtime-extractor-sa serviceAccountName: insights-runtime-extractor-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists - effect: NoSchedule key: node.kubernetes.io/disk-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/pid-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/unschedulable operator: Exists volumes: - hostPath: path: /run/crio/crio.sock type: Socket name: crio-socket - emptyDir: {} name: data-volume - configMap: defaultMode: 420 name: kube-rbac-proxy name: kube-rbac-proxy-cm - name: insights-runtime-extractor-tls secret: defaultMode: 420 secretName: insights-runtime-extractor-tls - name: kube-api-access-7djb8 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:34Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:24Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:34Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:34Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:24Z" status: "True" type: PodScheduled containerStatuses: - allocatedResources: cpu: 10m memory: 200Mi containerID: cri-o://8a3010ef2155729cd81dfa8bbbf4e640787f3ecc09a7b32bda2f43672fe7e2b7 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1c14048344094d80d8713c7d5f5cd9c7962fae58d4c9a2b740f376d44f7a3341 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1c14048344094d80d8713c7d5f5cd9c7962fae58d4c9a2b740f376d44f7a3341 lastState: {} name: exporter ready: true resources: requests: cpu: 10m memory: 200Mi restartCount: 0 started: true state: running: startedAt: "2026-05-11T20:51:31Z" user: linux: gid: 0 supplementalGroups: - 0 uid: 0 volumeMounts: - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-7djb8 readOnly: true recursiveReadOnly: Disabled - allocatedResources: cpu: 10m memory: 200Mi containerID: cri-o://9b596526e0f1bff0be5d48983d7dcb6ed617ebbbe104bfddb0087b20cdf5cfa8 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5df3298a46f3edc470924380d29bd1e74c956ca92ced3496318a6d9503ff3e99 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:34563584bcd354cbfbba08c46692d3d52b3e8f0fcdd866c96e1b342d155cabb3 lastState: {} name: extractor ready: true resources: requests: cpu: 10m memory: 200Mi restartCount: 0 started: true state: running: startedAt: "2026-05-11T20:51:34Z" user: linux: gid: 0 supplementalGroups: - 0 uid: 0 volumeMounts: - mountPath: /crio.sock name: crio-socket - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-7djb8 readOnly: true recursiveReadOnly: Disabled - allocatedResources: cpu: 10m memory: 100Mi containerID: cri-o://510dfff050edbc3a80e17da99c80d34269e753bff6757629789a69823e08e302 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86f555058d2bb5395e2046e8ecb795f4fc82f5017072115e1a19a9b1ce910e75 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:54d33b9efe0867328de774ed049be40275c0bf8fea65d4ac5b319e99e2374b0f lastState: {} name: kube-rbac-proxy ready: true resources: requests: cpu: 10m memory: 100Mi restartCount: 0 started: true state: running: startedAt: "2026-05-11T20:51:30Z" user: linux: gid: 65534 supplementalGroups: - 65534 uid: 65534 volumeMounts: - mountPath: /etc/tls/private name: insights-runtime-extractor-tls - mountPath: /etc/kube-rbac-proxy name: kube-rbac-proxy-cm - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-7djb8 readOnly: true recursiveReadOnly: Disabled hostIP: 10.0.135.190 hostIPs: - ip: 10.0.135.190 phase: Running podIP: 10.132.0.20 podIPs: - ip: 10.132.0.20 qosClass: Burstable startTime: "2026-05-11T20:51:24Z" - apiVersion: v1 kind: Pod metadata: annotations: k8s.ovn.org/pod-networks: '{"default":{"ip_addresses":["10.134.0.7/23"],"mac_address":"0a:58:0a:86:00:07","gateway_ips":["10.134.0.1"],"routes":[{"dest":"10.132.0.0/14","nextHop":"10.134.0.1"},{"dest":"172.31.0.0/16","nextHop":"10.134.0.1"},{"dest":"169.254.0.5/32","nextHop":"10.134.0.1"},{"dest":"100.64.0.0/16","nextHop":"10.134.0.1"}],"ip_address":"10.134.0.7/23","gateway_ip":"10.134.0.1","role":"primary"}}' k8s.v1.cni.cncf.io/network-status: |- [{ "name": "ovn-kubernetes", "interface": "eth0", "ips": [ "10.134.0.7" ], "mac": "0a:58:0a:86:00:07", "default": true, "dns": {} }] openshift.io/required-scc: insights-runtime-extractor-scc openshift.io/scc: insights-runtime-extractor-scc seccomp.security.alpha.kubernetes.io/pod: runtime/default security.openshift.io/validated-scc-subject-type: serviceaccount creationTimestamp: "2026-05-11T20:51:28Z" generateName: insights-runtime-extractor- generation: 1 labels: app.kubernetes.io/name: insights-runtime-extractor controller-revision-hash: 848f6ff4db pod-template-generation: "1" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.ovn.org/pod-networks: {} manager: ip-10-0-133-205 operation: Update subresource: status time: "2026-05-11T20:51:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: .: {} f:openshift.io/required-scc: {} f:target.workload.openshift.io/management: {} f:generateName: {} f:labels: .: {} f:app.kubernetes.io/name: {} f:controller-revision-hash: {} f:pod-template-generation: {} f:ownerReferences: .: {} k:{"uid":"e77570c0-d3ad-45dd-8417-0bd8a12db98b"}: {} f:spec: f:affinity: .: {} f:nodeAffinity: .: {} f:requiredDuringSchedulingIgnoredDuringExecution: {} f:containers: k:{"name":"exporter"}: .: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/data"}: .: {} f:mountPath: {} f:name: {} k:{"name":"extractor"}: .: {} f:env: .: {} k:{"name":"CONTAINER_RUNTIME_ENDPOINT"}: .: {} f:name: {} f:value: {} f:image: {} f:imagePullPolicy: {} f:livenessProbe: .: {} f:exec: .: {} f:command: {} f:failureThreshold: {} f:periodSeconds: {} f:successThreshold: {} f:timeoutSeconds: {} f:name: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:capabilities: .: {} f:add: {} f:drop: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/crio.sock"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/data"}: .: {} f:mountPath: {} f:name: {} k:{"name":"kube-rbac-proxy"}: .: {} f:args: {} f:image: {} f:imagePullPolicy: {} f:name: {} f:ports: .: {} k:{"containerPort":8443,"protocol":"TCP"}: .: {} f:containerPort: {} f:name: {} f:protocol: {} f:resources: .: {} f:requests: .: {} f:cpu: {} f:memory: {} f:securityContext: .: {} f:allowPrivilegeEscalation: {} f:capabilities: .: {} f:drop: {} f:privileged: {} f:readOnlyRootFilesystem: {} f:runAsNonRoot: {} f:terminationMessagePath: {} f:terminationMessagePolicy: {} f:volumeMounts: .: {} k:{"mountPath":"/etc/kube-rbac-proxy"}: .: {} f:mountPath: {} f:name: {} k:{"mountPath":"/etc/tls/private"}: .: {} f:mountPath: {} f:name: {} f:dnsPolicy: {} f:enableServiceLinks: {} f:hostPID: {} f:nodeSelector: {} f:priorityClassName: {} f:restartPolicy: {} f:schedulerName: {} f:securityContext: {} f:serviceAccount: {} f:serviceAccountName: {} f:terminationGracePeriodSeconds: {} f:tolerations: {} f:volumes: .: {} k:{"name":"crio-socket"}: .: {} f:hostPath: .: {} f:path: {} f:type: {} f:name: {} k:{"name":"data-volume"}: .: {} f:emptyDir: {} f:name: {} k:{"name":"insights-runtime-extractor-tls"}: .: {} f:name: {} f:secret: .: {} f:defaultMode: {} f:secretName: {} k:{"name":"kube-rbac-proxy-cm"}: .: {} f:configMap: .: {} f:defaultMode: {} f:name: {} f:name: {} manager: kube-controller-manager operation: Update time: "2026-05-11T20:51:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:k8s.v1.cni.cncf.io/network-status: {} manager: multus-daemon operation: Update subresource: status time: "2026-05-11T20:51:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:status: f:conditions: k:{"type":"ContainersReady"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Initialized"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"PodReadyToStartContainers"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} k:{"type":"Ready"}: .: {} f:lastProbeTime: {} f:lastTransitionTime: {} f:status: {} f:type: {} f:containerStatuses: {} f:hostIP: {} f:hostIPs: {} f:phase: {} f:podIP: {} f:podIPs: .: {} k:{"ip":"10.134.0.7"}: .: {} f:ip: {} f:startTime: {} manager: kubelet operation: Update subresource: status time: "2026-05-11T20:51:34Z" name: insights-runtime-extractor-xkrjf namespace: openshift-insights ownerReferences: - apiVersion: apps/v1 blockOwnerDeletion: true controller: true kind: DaemonSet name: insights-runtime-extractor uid: e77570c0-d3ad-45dd-8417-0bd8a12db98b resourceVersion: "8067" uid: a4119420-0b77-4749-8a7f-0a8814c65f64 spec: affinity: nodeAffinity: requiredDuringSchedulingIgnoredDuringExecution: nodeSelectorTerms: - matchFields: - key: metadata.name operator: In values: - ip-10-0-133-205.ec2.internal containers: - args: - --secure-listen-address=:8443 - --upstream=http://127.0.0.1:8000 - --config-file=/etc/kube-rbac-proxy/config.yaml - --tls-cert-file=/etc/tls/private/tls.crt - --tls-private-key-file=/etc/tls/private/tls.key image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86f555058d2bb5395e2046e8ecb795f4fc82f5017072115e1a19a9b1ce910e75 imagePullPolicy: IfNotPresent name: kube-rbac-proxy ports: - containerPort: 8443 name: https protocol: TCP resources: requests: cpu: 10m memory: 100Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL privileged: false readOnlyRootFilesystem: true runAsNonRoot: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: FallbackToLogsOnError volumeMounts: - mountPath: /etc/tls/private name: insights-runtime-extractor-tls - mountPath: /etc/kube-rbac-proxy name: kube-rbac-proxy-cm - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-xkns9 readOnly: true - image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1c14048344094d80d8713c7d5f5cd9c7962fae58d4c9a2b740f376d44f7a3341 imagePullPolicy: Always name: exporter resources: requests: cpu: 10m memory: 200Mi securityContext: allowPrivilegeEscalation: false capabilities: drop: - ALL privileged: false readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-xkns9 readOnly: true - env: - name: CONTAINER_RUNTIME_ENDPOINT value: unix:///crio.sock image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5df3298a46f3edc470924380d29bd1e74c956ca92ced3496318a6d9503ff3e99 imagePullPolicy: Always livenessProbe: exec: command: - crictl - --timeout - 10s - info failureThreshold: 3 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 1 name: extractor resources: requests: cpu: 10m memory: 200Mi securityContext: capabilities: add: - CAP_SYS_ADMIN drop: - ALL privileged: true readOnlyRootFilesystem: true terminationMessagePath: /dev/termination-log terminationMessagePolicy: File volumeMounts: - mountPath: /crio.sock name: crio-socket - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-xkns9 readOnly: true dnsPolicy: ClusterFirst enableServiceLinks: true hostPID: true imagePullSecrets: - name: insights-runtime-extractor-sa-dockercfg-s999c nodeName: ip-10-0-133-205.ec2.internal nodeSelector: kubernetes.io/os: linux preemptionPolicy: PreemptLowerPriority priority: 1000000000 priorityClassName: openshift-user-critical restartPolicy: Always schedulerName: default-scheduler securityContext: seccompProfile: type: RuntimeDefault serviceAccount: insights-runtime-extractor-sa serviceAccountName: insights-runtime-extractor-sa terminationGracePeriodSeconds: 30 tolerations: - effect: NoExecute key: node.kubernetes.io/not-ready operator: Exists - effect: NoExecute key: node.kubernetes.io/unreachable operator: Exists - effect: NoSchedule key: node.kubernetes.io/disk-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/memory-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/pid-pressure operator: Exists - effect: NoSchedule key: node.kubernetes.io/unschedulable operator: Exists volumes: - hostPath: path: /run/crio/crio.sock type: Socket name: crio-socket - emptyDir: {} name: data-volume - configMap: defaultMode: 420 name: kube-rbac-proxy name: kube-rbac-proxy-cm - name: insights-runtime-extractor-tls secret: defaultMode: 420 secretName: insights-runtime-extractor-tls - name: kube-api-access-xkns9 projected: defaultMode: 420 sources: - serviceAccountToken: expirationSeconds: 3607 path: token - configMap: items: - key: ca.crt path: ca.crt name: kube-root-ca.crt - downwardAPI: items: - fieldRef: apiVersion: v1 fieldPath: metadata.namespace path: namespace - configMap: items: - key: service-ca.crt path: service-ca.crt name: openshift-service-ca.crt status: conditions: - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:34Z" status: "True" type: PodReadyToStartContainers - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:28Z" status: "True" type: Initialized - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:34Z" status: "True" type: Ready - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:34Z" status: "True" type: ContainersReady - lastProbeTime: null lastTransitionTime: "2026-05-11T20:51:28Z" status: "True" type: PodScheduled containerStatuses: - allocatedResources: cpu: 10m memory: 200Mi containerID: cri-o://0f10d43b7876ab1c2b70b20449a63b3ca28afd3044a1b15dc322ab6b1974f60b image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1c14048344094d80d8713c7d5f5cd9c7962fae58d4c9a2b740f376d44f7a3341 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:1c14048344094d80d8713c7d5f5cd9c7962fae58d4c9a2b740f376d44f7a3341 lastState: {} name: exporter ready: true resources: requests: cpu: 10m memory: 200Mi restartCount: 0 started: true state: running: startedAt: "2026-05-11T20:51:32Z" user: linux: gid: 0 supplementalGroups: - 0 uid: 0 volumeMounts: - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-xkns9 readOnly: true recursiveReadOnly: Disabled - allocatedResources: cpu: 10m memory: 200Mi containerID: cri-o://096e9a5de4f2bcfe005dad2dc2bd0930a3e9af548d928a6bd0fe62126c530ead image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:5df3298a46f3edc470924380d29bd1e74c956ca92ced3496318a6d9503ff3e99 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:34563584bcd354cbfbba08c46692d3d52b3e8f0fcdd866c96e1b342d155cabb3 lastState: {} name: extractor ready: true resources: requests: cpu: 10m memory: 200Mi restartCount: 0 started: true state: running: startedAt: "2026-05-11T20:51:34Z" user: linux: gid: 0 supplementalGroups: - 0 uid: 0 volumeMounts: - mountPath: /crio.sock name: crio-socket - mountPath: /data name: data-volume - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-xkns9 readOnly: true recursiveReadOnly: Disabled - allocatedResources: cpu: 10m memory: 100Mi containerID: cri-o://5ab22feec946feff7fa0e71d6afba63758e2d53da21aa99666d600efa5777de5 image: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:86f555058d2bb5395e2046e8ecb795f4fc82f5017072115e1a19a9b1ce910e75 imageID: quay.io/openshift-release-dev/ocp-v4.0-art-dev@sha256:54d33b9efe0867328de774ed049be40275c0bf8fea65d4ac5b319e99e2374b0f lastState: {} name: kube-rbac-proxy ready: true resources: requests: cpu: 10m memory: 100Mi restartCount: 0 started: true state: running: startedAt: "2026-05-11T20:51:31Z" user: linux: gid: 65534 supplementalGroups: - 65534 uid: 65534 volumeMounts: - mountPath: /etc/tls/private name: insights-runtime-extractor-tls - mountPath: /etc/kube-rbac-proxy name: kube-rbac-proxy-cm - mountPath: /var/run/secrets/kubernetes.io/serviceaccount name: kube-api-access-xkns9 readOnly: true recursiveReadOnly: Disabled hostIP: 10.0.133.205 hostIPs: - ip: 10.0.133.205 phase: Running podIP: 10.134.0.7 podIPs: - ip: 10.134.0.7 qosClass: Burstable startTime: "2026-05-11T20:51:28Z" kind: PodList metadata: resourceVersion: "46254"