W0423 21:51:03.852257 1 client_config.go:667] Neither --kubeconfig nor --master was specified. Using the inClusterConfig. This might not work. I0423 21:51:03.852681 1 envvar.go:172] "Feature gate default state" feature="InformerResourceVersion" enabled=false I0423 21:51:03.852697 1 envvar.go:172] "Feature gate default state" feature="WatchListClient" enabled=false I0423 21:51:03.852702 1 envvar.go:172] "Feature gate default state" feature="ClientsAllowCBOR" enabled=false I0423 21:51:03.852707 1 envvar.go:172] "Feature gate default state" feature="ClientsPreferCBOR" enabled=false I0423 21:51:03.852710 1 envvar.go:172] "Feature gate default state" feature="InOrderInformers" enabled=true I0423 21:51:03.881418 1 simple_featuregate_reader.go:171] Starting feature-gate-detector I0423 21:51:03.885907 1 reflector.go:436] "Caches populated" type="*v1.FeatureGate" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0423 21:51:03.886044 1 reflector.go:436] "Caches populated" type="*v1.ClusterVersion" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0423 21:51:03.886303 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'FeatureGatesInitialized' FeatureGates updated to featuregates.Features{Enabled:[]v1.FeatureGateName{"AdditionalRoutingCapabilities", "AdminNetworkPolicy", "AlibabaPlatform", "AzureWorkloadIdentity", "BuildCSIVolumes", "CPMSMachineNamePrefix", "ConsolePluginContentSecurityPolicy", "ExternalOIDC", "ExternalOIDCWithUIDAndExtraClaimMappings", "GCPClusterHostedDNSInstall", "GatewayAPI", "GatewayAPIController", "HighlyAvailableArbiter", "HyperShiftOnlyDynamicResourceAllocation", "ImageStreamImportMode", "ImageVolume", "KMSv1", "MachineConfigNodes", "ManagedBootImages", "ManagedBootImagesAWS", "ManagedBootImagesAzure", "ManagedBootImagesvSphere", "MetricsCollectionProfiles", "NetworkDiagnosticsConfig", "NetworkLiveMigration", "NetworkSegmentation", "PinnedImages", "PreconfiguredUDNAddresses", "ProcMountType", "RouteAdvertisements", "RouteExternalCertificate", "ServiceAccountTokenNodeBinding", "SigstoreImageVerification", "SigstoreImageVerificationPKI", "StoragePerformantSecurityPolicy", "UpgradeStatus", "UserNamespacesPodSecurityStandards", "UserNamespacesSupport", "VSphereMultiDisk", "VSphereMultiNetworks", "VolumeAttributesClass"}, Disabled:[]v1.FeatureGateName{"AWSClusterHostedDNS", "AWSClusterHostedDNSInstall", "AWSDedicatedHosts", "AWSDualStackInstall", "AWSServiceLBNetworkSecurityGroup", "AutomatedEtcdBackup", "AzureClusterHostedDNSInstall", "AzureDedicatedHosts", "AzureDualStackInstall", "AzureMultiDisk", "BootImageSkewEnforcement", "BootcNodeManagement", "CBORServingAndStorage", "CRDCompatibilityRequirementOperator", "ClientsAllowCBOR", "ClientsPreferCBOR", "ClusterAPIInstall", "ClusterAPIInstallIBMCloud", "ClusterAPIMachineManagement", "ClusterAPIMachineManagementVSphere", "ClusterMonitoringConfig", "ClusterVersionOperatorConfiguration", "DNSNameResolver", "DualReplica", "DyanmicServiceEndpointIBMCloud", "EtcdBackendQuota", "EventTTL", "EventedPLEG", "Example", "Example2", "ExternalSnapshotMetadata", "GCPClusterHostedDNS", "GCPCustomAPIEndpoints", "GCPCustomAPIEndpointsInstall", "GCPDualStackInstall", "ImageModeStatusReporting", "IngressControllerDynamicConfigurationManager", "InsightsConfig", "InsightsOnDemandDataGather", "IrreconcilableMachineConfig", "KMSEncryption", "KMSEncryptionProvider", "MachineAPIMigration", "MachineAPIOperatorDisableMachineHealthCheckController", "ManagedBootImagesCPMS", "MaxUnavailableStatefulSet", "MinimumKubeletVersion", "MixedCPUsAllocation", "MultiArchInstallAzure", "MultiDiskSetup", "MutableCSINodeAllocatableCount", "MutatingAdmissionPolicy", "NewOLM", "NewOLMBoxCutterRuntime", "NewOLMCatalogdAPIV1Metas", "NewOLMOwnSingleNamespace", "NewOLMPreflightPermissionChecks", "NewOLMWebhookProviderOpenshiftServiceCA", "NoRegistryClusterInstall", "NutanixMultiSubnets", "OSStreams", "OVNObservability", "OnPremDNSRecords", "OpenShiftPodSecurityAdmission", "ProvisioningRequestAvailable", "SELinuxMount", "ShortCertRotation", "SignatureStores", "TranslateStreamCloseWebsocketRequests", "VSphereConfigurableMaxAllowedBlockVolumesPerNode", "VSphereHostVMGroupZonal", "VSphereMixedNodeEnv", "VolumeGroupSnapshot"}} I0423 21:51:03.887784 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/etc/tls/private/tls.crt::/etc/tls/private/tls.key" I0423 21:51:03.896223 1 reflector.go:436] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0423 21:51:03.897331 1 reflector.go:436] "Caches populated" type="*v1.ConfigMap" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:569" I0423 21:51:03.897841 1 reflector.go:436] "Caches populated" type="*v1.CertificateSigningRequest" reflector="k8s.io/client-go/informers/factory.go:160" I0423 21:51:03.898117 1 reflector.go:436] "Caches populated" type="*v1.Secret" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:569" I0423 21:51:03.899045 1 reflector.go:436] "Caches populated" type="*v1.ConfigMap" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:566" I0423 21:51:03.902105 1 reflector.go:436] "Caches populated" type="*v1.APIServer" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:569" I0423 21:51:03.902277 1 reflector.go:436] "Caches populated" type="*v1.ConfigMap" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:569" I0423 21:51:03.902624 1 reflector.go:436] "Caches populated" type="*v1.Console" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:569" I0423 21:51:03.902834 1 reflector.go:436] "Caches populated" type="*v1.ConfigMap" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:569" I0423 21:51:03.903992 1 reflector.go:436] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:569" I0423 21:51:03.904137 1 reflector.go:436] "Caches populated" type="*v1.ClusterOperator" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:569" I0423 21:51:03.904200 1 operator.go:647] Triggering an update due to a change in ClusterOperator.config.openshift.io/ingress I0423 21:51:03.904260 1 reflector.go:436] "Caches populated" type="*v1.ClusterVersion" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:569" I0423 21:51:03.908781 1 operator.go:647] Triggering an update due to a change in *v1.APIServer/cluster I0423 21:51:03.915614 1 operator.go:647] Triggering an update due to a change in *v1.Infrastructure/cluster I0423 21:51:03.916189 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:03.938229 1 reflector.go:436] "Caches populated" type="*v1.ConfigMap" reflector="github.com/openshift/cluster-monitoring-operator/pkg/operator/operator.go:569" I0423 21:51:03.993522 1 operator.go:598] ConfigMap to configure stack does not exist. Reconciling with default config every 5m0s. W0423 21:51:03.993586 1 operator.go:974] No Cluster Monitoring ConfigMap was found. Using defaults. I0423 21:51:03.993594 1 base_controller.go:76] Waiting for caches to sync for OpenShiftMonitoringClientCertRequester I0423 21:51:03.993604 1 base_controller.go:82] Caches are synced for OpenShiftMonitoringClientCertRequester I0423 21:51:03.993609 1 base_controller.go:119] Starting #1 worker of OpenShiftMonitoringClientCertRequester controller ... I0423 21:51:03.993612 1 base_controller.go:76] Waiting for caches to sync for OpenShiftMonitoringTelemeterClientCertRequester I0423 21:51:03.993615 1 rule_controller.go:114] Starting alerting rules controller I0423 21:51:03.993627 1 base_controller.go:82] Caches are synced for OpenShiftMonitoringTelemeterClientCertRequester I0423 21:51:03.993635 1 base_controller.go:119] Starting #1 worker of OpenShiftMonitoringTelemeterClientCertRequester controller ... I0423 21:51:03.993630 1 relabel_controller.go:117] Starting alert relabel config controller I0423 21:51:03.993642 1 shared_informer.go:349] "Waiting for caches to sync" controller="AlertingRule controller" I0423 21:51:03.993653 1 base_controller.go:76] Waiting for caches to sync for OpenShiftMonitoringMetricsServerClientCertRequester I0423 21:51:03.993659 1 shared_informer.go:349] "Waiting for caches to sync" controller="AlertRelabelConfig controller" I0423 21:51:03.993669 1 base_controller.go:82] Caches are synced for OpenShiftMonitoringMetricsServerClientCertRequester I0423 21:51:03.993676 1 base_controller.go:119] Starting #1 worker of OpenShiftMonitoringMetricsServerClientCertRequester controller ... I0423 21:51:03.997643 1 reflector.go:436] "Caches populated" type="*v1.AlertingRule" reflector="github.com/openshift/cluster-monitoring-operator/pkg/alert/rule_controller.go:119" I0423 21:51:03.997889 1 reflector.go:436] "Caches populated" type="*v1.Secret" reflector="github.com/openshift/cluster-monitoring-operator/pkg/alert/relabel_controller.go:122" I0423 21:51:03.998010 1 reflector.go:436] "Caches populated" type="*v1.PrometheusRule" reflector="github.com/openshift/cluster-monitoring-operator/pkg/alert/rule_controller.go:118" I0423 21:51:03.998033 1 reflector.go:436] "Caches populated" type="*v1.AlertRelabelConfig" reflector="github.com/openshift/cluster-monitoring-operator/pkg/alert/relabel_controller.go:121" I0423 21:51:03.999765 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:03.999768 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:03.999768 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:03.999985 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NoValidCertificateFound' No valid client certificate for OpenShiftMonitoringMetricsServerClientCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates I0423 21:51:04.000153 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NoValidCertificateFound' No valid client certificate for OpenShiftMonitoringTelemeterClientCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates I0423 21:51:04.000176 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NoValidCertificateFound' No valid client certificate for OpenShiftMonitoringClientCertRequester is found: unable to parse certificate: data does not contain any valid RSA or ECDSA certificates I0423 21:51:04.013499 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRCreated' A csr "system:openshift:openshift-monitoring-zxchs" is created for OpenShiftMonitoringMetricsServerClientCertRequester I0423 21:51:04.013870 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRCreated' A csr "system:openshift:openshift-monitoring-j7kwc" is created for OpenShiftMonitoringClientCertRequester I0423 21:51:04.013880 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'CSRCreated' A csr "system:openshift:openshift-monitoring-4ghzl" is created for OpenShiftMonitoringTelemeterClientCertRequester I0423 21:51:04.025187 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.025337 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.025349 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.030660 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.031074 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.031508 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.035031 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.035482 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.036280 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.039578 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.040151 1 operator.go:830] Updating ClusterOperator status to InProgress. I0423 21:51:04.040370 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.040634 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.044637 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.047618 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.047929 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.049891 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.057911 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.058525 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.058882 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.060290 1 tasks.go:49] processing task group 1 of 3 I0423 21:51:04.060314 1 tasks.go:70] running task 2 of 2: UpdatingPrometheusOperator I0423 21:51:04.060327 1 tasks.go:70] running task 1 of 2: UpdatingMetricsScrapingClientCA I0423 21:51:04.063205 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.066542 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.066549 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.067957 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.070721 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.071072 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.073404 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/prometheus-operator -n openshift-monitoring because it was missing I0423 21:51:04.073957 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.075275 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.076834 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.081460 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.085919 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.086010 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/metrics-client-ca -n openshift-monitoring because it was missing I0423 21:51:04.086085 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.086519 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.091718 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.093847 1 shared_informer.go:356] "Caches are synced" controller="AlertingRule controller" I0423 21:51:04.093856 1 shared_informer.go:356] "Caches are synced" controller="AlertRelabelConfig controller" I0423 21:51:04.095397 1 tasks.go:76] ran task 1 of 2: UpdatingMetricsScrapingClientCA I0423 21:51:04.095418 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.095830 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.096461 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.100185 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.101224 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.101652 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.104875 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.104934 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/alert-relabel-configs -n openshift-monitoring because it was missing I0423 21:51:04.105520 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.107053 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.109580 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.110253 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.114557 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:04.139518 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/prometheus-operator because it was missing I0423 21:51:04.234857 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/prometheus-operator because it was missing I0423 21:51:04.247102 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/prometheus-operator-admission-webhook -n openshift-monitoring because it was missing I0423 21:51:04.268635 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/prometheus-operator-admission-webhook -n openshift-monitoring because it was missing I0423 21:51:04.282687 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodDisruptionBudgetCreated' Created PodDisruptionBudget.policy/prometheus-operator-admission-webhook -n openshift-monitoring because it was missing I0423 21:51:04.743041 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0423 21:51:04.744666 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0423 21:51:04.744682 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0423 21:51:04.744698 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0423 21:51:04.744704 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0423 21:51:04.747865 1 secure_serving.go:57] Forcing use of http/1.1 only I0423 21:51:04.747885 1 genericapiserver.go:552] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete I0423 21:51:04.752715 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0423 21:51:04.752740 1 shared_informer.go:349] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0423 21:51:04.752783 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0423 21:51:04.752792 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0423 21:51:04.752806 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0423 21:51:04.752811 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0423 21:51:04.753020 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/etc/tls/private/tls.crt::/etc/tls/private/tls.key" I0423 21:51:04.753226 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/tls/private/tls.crt::/etc/tls/private/tls.key" certDetail="\"*.cluster-monitoring-operator.openshift-monitoring.svc\" [serving] validServingFor=[*.cluster-monitoring-operator.openshift-monitoring.svc,*.cluster-monitoring-operator.openshift-monitoring.svc.cluster.local,cluster-monitoring-operator.openshift-monitoring.svc,cluster-monitoring-operator.openshift-monitoring.svc.cluster.local] issuer=\"openshift-service-serving-signer@1776981042\" (2026-04-23 21:50:51 +0000 UTC to 2028-04-22 21:50:52 +0000 UTC (now=2026-04-23 21:51:04.753146762 +0000 UTC))" I0423 21:51:04.753443 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776981064\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776981064\" (2026-04-23 20:51:03 +0000 UTC to 2029-04-23 20:51:03 +0000 UTC (now=2026-04-23 21:51:04.753425746 +0000 UTC))" I0423 21:51:04.753464 1 secure_serving.go:211] Serving securely on [::]:8443 I0423 21:51:04.753480 1 genericapiserver.go:702] [graceful-termination] waiting for shutdown to be initiated I0423 21:51:04.753485 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0423 21:51:04.756503 1 reflector.go:436] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0423 21:51:04.756503 1 reflector.go:436] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0423 21:51:04.756508 1 reflector.go:436] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0423 21:51:04.852987 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0423 21:51:04.853006 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0423 21:51:04.853091 1 shared_informer.go:356] "Caches are synced" controller="RequestHeaderAuthRequestController" I0423 21:51:04.853197 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-04-23 21:40:53 +0000 UTC to 2036-04-20 21:40:53 +0000 UTC (now=2026-04-23 21:51:04.853154814 +0000 UTC))" I0423 21:51:04.853449 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/tls/private/tls.crt::/etc/tls/private/tls.key" certDetail="\"*.cluster-monitoring-operator.openshift-monitoring.svc\" [serving] validServingFor=[*.cluster-monitoring-operator.openshift-monitoring.svc,*.cluster-monitoring-operator.openshift-monitoring.svc.cluster.local,cluster-monitoring-operator.openshift-monitoring.svc,cluster-monitoring-operator.openshift-monitoring.svc.cluster.local] issuer=\"openshift-service-serving-signer@1776981042\" (2026-04-23 21:50:51 +0000 UTC to 2028-04-22 21:50:52 +0000 UTC (now=2026-04-23 21:51:04.853429605 +0000 UTC))" I0423 21:51:04.853655 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776981064\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776981064\" (2026-04-23 20:51:03 +0000 UTC to 2029-04-23 20:51:03 +0000 UTC (now=2026-04-23 21:51:04.853641709 +0000 UTC))" I0423 21:51:04.853801 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-04-23 21:40:54 +0000 UTC to 2036-04-20 21:40:54 +0000 UTC (now=2026-04-23 21:51:04.853782253 +0000 UTC))" I0423 21:51:04.853828 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-04-23 21:40:56 +0000 UTC to 2036-04-20 21:40:56 +0000 UTC (now=2026-04-23 21:51:04.85381544 +0000 UTC))" I0423 21:51:04.853848 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-04-23 21:40:58 +0000 UTC to 2036-04-20 21:40:58 +0000 UTC (now=2026-04-23 21:51:04.853839676 +0000 UTC))" I0423 21:51:04.853863 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-04-23 21:41:01 +0000 UTC to 2036-04-20 21:41:01 +0000 UTC (now=2026-04-23 21:51:04.853855432 +0000 UTC))" I0423 21:51:04.853877 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-04-23 21:41:02 +0000 UTC to 2036-04-20 21:41:02 +0000 UTC (now=2026-04-23 21:51:04.853869667 +0000 UTC))" I0423 21:51:04.853899 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2ps4596k02g87f728elrjhduc7bmtv3r-kx-a30fa74cd2_customer-system-admin-signer@1776980612\" [] issuer=\"\" (2026-04-23 21:43:35 +0000 UTC to 2026-04-30 21:43:36 +0000 UTC (now=2026-04-23 21:51:04.853883605 +0000 UTC))" I0423 21:51:04.853928 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2ps4596k02g87f728elrjhduc7bmtv3r-kx-a30fa74cd2_sre-system-admin-signer@1776980612\" [] issuer=\"\" (2026-04-23 21:43:40 +0000 UTC to 2026-04-30 21:43:41 +0000 UTC (now=2026-04-23 21:51:04.853913803 +0000 UTC))" I0423 21:51:04.853954 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-04-23 21:40:53 +0000 UTC to 2036-04-20 21:40:53 +0000 UTC (now=2026-04-23 21:51:04.853938824 +0000 UTC))" I0423 21:51:04.854149 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/etc/tls/private/tls.crt::/etc/tls/private/tls.key" certDetail="\"*.cluster-monitoring-operator.openshift-monitoring.svc\" [serving] validServingFor=[*.cluster-monitoring-operator.openshift-monitoring.svc,*.cluster-monitoring-operator.openshift-monitoring.svc.cluster.local,cluster-monitoring-operator.openshift-monitoring.svc,cluster-monitoring-operator.openshift-monitoring.svc.cluster.local] issuer=\"openshift-service-serving-signer@1776981042\" (2026-04-23 21:50:51 +0000 UTC to 2028-04-22 21:50:52 +0000 UTC (now=2026-04-23 21:51:04.8541314 +0000 UTC))" I0423 21:51:04.854342 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776981064\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776981064\" (2026-04-23 20:51:03 +0000 UTC to 2029-04-23 20:51:03 +0000 UTC (now=2026-04-23 21:51:04.854325329 +0000 UTC))" I0423 21:51:06.674106 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-server-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:06.674106 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/metrics-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:06.674340 1 annotations.go:52] Updating "openshift.io/owning-component" annotation for openshift-monitoring/federate-client-certs, diff: string( - "", + "Monitoring", ) I0423 21:51:06.674378 1 annotations.go:76] Updating "auth.openshift.io/certificate-not-before" annotation for metrics-server-client-certs/openshift-monitoring, diff: string( - "", + "2026-04-23T21:46:06Z", ) I0423 21:51:06.674383 1 annotations.go:76] Updating "auth.openshift.io/certificate-not-before" annotation for metrics-client-certs/openshift-monitoring, diff: string( - "", + "2026-04-23T21:46:06Z", ) I0423 21:51:06.674403 1 annotations.go:82] Updating "auth.openshift.io/certificate-not-after" annotation for metrics-server-client-certs/openshift-monitoring, diff: string( - "", + "2028-04-22T21:46:06Z", ) I0423 21:51:06.674405 1 annotations.go:82] Updating "auth.openshift.io/certificate-not-after" annotation for metrics-client-certs/openshift-monitoring, diff: string( - "", + "2028-04-22T21:46:06Z", ) I0423 21:51:06.674480 1 annotations.go:76] Updating "auth.openshift.io/certificate-not-before" annotation for federate-client-certs/openshift-monitoring, diff: string( - "", + "2026-04-23T21:46:06Z", ) I0423 21:51:06.674495 1 annotations.go:82] Updating "auth.openshift.io/certificate-not-after" annotation for federate-client-certs/openshift-monitoring, diff: string( - "", + "2028-04-22T21:46:06Z", ) I0423 21:51:06.682859 1 operator.go:678] Triggering an update due to ConfigMap or Secret: openshift-monitoring/metrics-client-certs I0423 21:51:06.683141 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClientCertificateCreated' A new client certificate for OpenShiftMonitoringClientCertRequester is available I0423 21:51:06.687606 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClientCertificateCreated' A new client certificate for OpenShiftMonitoringTelemeterClientCertRequester is available I0423 21:51:06.687659 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClientCertificateCreated' A new client certificate for OpenShiftMonitoringMetricsServerClientCertRequester is available I0423 21:51:06.687754 1 operator.go:678] Triggering an update due to ConfigMap or Secret: openshift-monitoring/federate-client-certs I0423 21:51:06.687869 1 operator.go:678] Triggering an update due to ConfigMap or Secret: openshift-monitoring/metrics-server-client-certs I0423 21:51:11.329926 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/prometheusrules.openshift.io because it was missing I0423 21:51:11.342518 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/alertmanagerconfigs.openshift.io because it was missing I0423 21:51:11.358726 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/prometheus-operator -n openshift-monitoring because it was missing I0423 21:51:14.483215 1 operator.go:647] Triggering an update due to a change in *v1.Console/cluster I0423 21:51:15.540038 1 tasks.go:76] ran task 2 of 2: UpdatingPrometheusOperator I0423 21:51:15.540061 1 tasks.go:49] processing task group 2 of 3 I0423 21:51:15.540087 1 tasks.go:70] running task 15 of 15: UpdatingUserWorkloadThanosRuler I0423 21:51:15.540090 1 tasks.go:70] running task 4 of 15: UpdatingNodeExporter I0423 21:51:15.540105 1 tasks.go:70] running task 2 of 15: UpdatingPrometheus I0423 21:51:15.540113 1 tasks.go:70] running task 3 of 15: UpdatingAlertmanager I0423 21:51:15.540122 1 tasks.go:70] running task 9 of 15: UpdatingThanosQuerier I0423 21:51:15.540124 1 tasks.go:70] running task 1 of 15: UpdatingClusterMonitoringOperatorDeps I0423 21:51:15.540131 1 tasks.go:70] running task 7 of 15: UpdatingMetricsServer I0423 21:51:15.540134 1 tasks.go:70] running task 6 of 15: UpdatingOpenshiftStateMetrics I0423 21:51:15.540144 1 tasks.go:70] running task 12 of 15: UpdatingUserWorkloadPrometheusOperator I0423 21:51:15.540145 1 tasks.go:70] running task 10 of 15: UpdatingControlPlaneComponents I0423 21:51:15.540150 1 tasks.go:70] running task 5 of 15: UpdatingKubeStateMetrics I0423 21:51:15.540154 1 tasks.go:70] running task 11 of 15: UpdatingConsolePluginComponents I0423 21:51:15.540175 1 tasks.go:70] running task 14 of 15: UpdatingUserWorkloadAlertmanager I0423 21:51:15.540177 1 tasks.go:70] running task 13 of 15: UpdatingUserWorkloadPrometheus I0423 21:51:15.540149 1 tasks.go:70] running task 8 of 15: UpdatingTelemeterClient I0423 21:51:15.561379 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/kube-state-metrics -n openshift-monitoring because it was missing I0423 21:51:15.562484 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/openshift-state-metrics -n openshift-monitoring because it was missing I0423 21:51:15.576468 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/thanos-querier -n openshift-monitoring because it was missing I0423 21:51:15.577538 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/node-exporter -n openshift-monitoring because it was missing I0423 21:51:15.582940 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/telemeter-client -n openshift-monitoring because it was missing I0423 21:51:15.600946 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kubelet-serving-ca-bundle -n openshift-monitoring because it was missing I0423 21:51:15.651038 1 tasks.go:76] ran task 10 of 15: UpdatingControlPlaneComponents I0423 21:51:15.654963 1 tasks.go:76] ran task 12 of 15: UpdatingUserWorkloadPrometheusOperator I0423 21:51:15.668435 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/alert-routing-edit because it was missing I0423 21:51:15.672614 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/prometheus-k8s because it was missing I0423 21:51:15.680330 1 tasks.go:76] ran task 14 of 15: UpdatingUserWorkloadAlertmanager I0423 21:51:15.706267 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/node-exporter because it was missing I0423 21:51:15.708782 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/telemeter-client because it was missing I0423 21:51:15.710604 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/kube-state-metrics because it was missing I0423 21:51:15.710889 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/openshift-state-metrics because it was missing I0423 21:51:15.784829 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/prometheus-k8s because it was missing I0423 21:51:15.786119 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/node-exporter because it was missing I0423 21:51:15.789314 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/openshift-state-metrics because it was missing I0423 21:51:15.789997 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/kube-state-metrics because it was missing I0423 21:51:15.791184 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cluster-monitoring-view because it was missing I0423 21:51:15.791383 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/telemeter-client because it was missing I0423 21:51:15.800637 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/metrics-server -n openshift-monitoring because it was missing I0423 21:51:15.806218 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/openshift-state-metrics -n openshift-monitoring because it was missing I0423 21:51:15.822272 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/node-exporter -n openshift-monitoring because it was missing I0423 21:51:15.825505 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/kube-state-metrics -n openshift-monitoring because it was missing I0423 21:51:15.847321 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/node-exporter-accelerators-collector-config -n openshift-monitoring because it was missing I0423 21:51:15.848715 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/kube-state-metrics-custom-resource-state-configmap -n openshift-monitoring because it was missing I0423 21:51:15.938304 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/system:metrics-server because it was missing I0423 21:51:15.947373 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/system:aggregated-metrics-reader because it was missing I0423 21:51:15.977068 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/telemeter-client-view because it was missing I0423 21:51:16.020833 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/telemeter-client -n openshift-monitoring because it was missing I0423 21:51:16.063150 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/telemeter-client -n openshift-monitoring because it was missing I0423 21:51:16.075417 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/telemeter-client-kube-rbac-proxy-config -n openshift-monitoring because it was missing I0423 21:51:16.089558 1 operator.go:678] Triggering an update due to ConfigMap or Secret: openshift-monitoring/telemeter-trusted-ca-bundle I0423 21:51:16.101575 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/system:metrics-server because it was missing I0423 21:51:16.103781 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/pod-metrics-reader because it was missing I0423 21:51:16.158306 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/metrics-server:system:auth-delegator because it was missing I0423 21:51:16.161980 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/monitoring-rules-edit because it was missing I0423 21:51:16.263617 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/monitoring-rules-view because it was missing I0423 21:51:16.268436 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/metrics-server-auth-reader -n kube-system because it was missing I0423 21:51:16.285747 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/metrics-server -n openshift-monitoring because it was missing I0423 21:51:16.354961 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/monitoring-edit because it was missing I0423 21:51:16.363761 1 operator.go:678] Triggering an update due to ConfigMap or Secret: openshift-monitoring/telemeter-trusted-ca-bundle I0423 21:51:16.462403 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/user-workload-monitoring-config-edit -n openshift-user-workload-monitoring because it was missing I0423 21:51:16.564991 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/monitoring-alertmanager-api-reader -n openshift-user-workload-monitoring because it was missing I0423 21:51:16.615070 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodDisruptionBudgetCreated' Created PodDisruptionBudget.policy/alertmanager-main -n openshift-monitoring because it was missing I0423 21:51:16.665222 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/monitoring-alertmanager-api-writer -n openshift-user-workload-monitoring because it was missing I0423 21:51:16.688794 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/thanos-querier-kube-rbac-proxy-web -n openshift-monitoring because it was missing I0423 21:51:16.706918 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/thanos-querier -n openshift-monitoring because it was missing I0423 21:51:16.754837 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/alertmanager-main because it was missing I0423 21:51:16.760023 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/thanos-querier because it was missing I0423 21:51:16.769020 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/monitoring-alertmanager-edit -n openshift-monitoring because it was missing I0423 21:51:16.851017 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/alertmanager-main because it was missing I0423 21:51:16.851427 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/thanos-querier because it was missing I0423 21:51:16.862178 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/alertmanager-main -n openshift-monitoring because it was missing I0423 21:51:16.866479 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/monitoring-alertmanager-view -n openshift-monitoring because it was missing I0423 21:51:16.893498 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/alertmanager-main -n openshift-monitoring because it was missing I0423 21:51:16.913735 1 operator.go:678] Triggering an update due to ConfigMap or Secret: openshift-monitoring/alertmanager-trusted-ca-bundle I0423 21:51:16.914024 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/alertmanager-trusted-ca-bundle -n openshift-monitoring because it was missing I0423 21:51:16.963711 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cluster-monitoring-metrics-api -n openshift-monitoring because it was missing I0423 21:51:17.175305 1 operator.go:678] Triggering an update due to ConfigMap or Secret: openshift-monitoring/alertmanager-trusted-ca-bundle I0423 21:51:17.600676 1 tasks.go:76] ran task 1 of 15: UpdatingClusterMonitoringOperatorDeps I0423 21:51:17.600750 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/grpc-tls -n openshift-monitoring because it was missing I0423 21:51:17.601590 1 operator.go:678] Triggering an update due to ConfigMap or Secret: openshift-monitoring/grpc-tls I0423 21:51:17.682616 1 tasks.go:76] ran task 15 of 15: UpdatingUserWorkloadThanosRuler I0423 21:51:17.708791 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/kube-rbac-proxy -n openshift-monitoring because it was missing I0423 21:51:17.721283 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/prometheus-k8s-kube-rbac-proxy-web -n openshift-monitoring because it was missing I0423 21:51:17.733667 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/prometheus-k8s -n openshift-monitoring because it was missing I0423 21:51:17.800485 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/alertmanager-prometheusk8s -n openshift-monitoring because it was missing I0423 21:51:17.869239 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/thanos-querier-grpc-tls-3oot46eq61cf8 -n openshift-monitoring because it was missing I0423 21:51:17.896887 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/prometheus-k8s-config -n openshift-monitoring because it was missing I0423 21:51:18.025698 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/prometheus-k8s -n default because it was missing I0423 21:51:18.130531 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/prometheus-k8s -n kube-system because it was missing I0423 21:51:18.232820 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-monitoring because it was missing I0423 21:51:18.330202 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/prometheus-k8s -n openshift-user-workload-monitoring because it was missing I0423 21:51:18.429100 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n default because it was missing I0423 21:51:18.531086 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n kube-system because it was missing I0423 21:51:18.642006 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-monitoring because it was missing I0423 21:51:18.679599 1 tasks.go:76] ran task 13 of 15: UpdatingUserWorkloadPrometheus I0423 21:51:18.736716 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s -n openshift-user-workload-monitoring because it was missing I0423 21:51:18.839610 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/prometheus-k8s-config -n openshift-monitoring because it was missing I0423 21:51:18.922443 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/prometheus-k8s -n openshift-monitoring because it was missing I0423 21:51:18.939425 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/prometheus-k8s-thanos-sidecar -n openshift-monitoring because it was missing I0423 21:51:19.318233 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/metrics-server-audit-profiles -n openshift-monitoring because it was missing I0423 21:51:20.344472 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/metrics-server-30sass6f91sps -n openshift-monitoring because it was missing I0423 21:51:20.613477 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/monitoring-plugin -n openshift-monitoring because it was missing I0423 21:51:20.649583 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/monitoring-plugin -n openshift-monitoring because it was missing I0423 21:51:20.962664 1 tasks.go:76] ran task 4 of 15: UpdatingNodeExporter I0423 21:51:21.146059 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/telemeter-trusted-ca-bundle-8i12ta5c71j38 -n openshift-monitoring because it was missing I0423 21:51:21.891263 1 tasks.go:76] ran task 6 of 15: UpdatingOpenshiftStateMetrics I0423 21:51:21.948386 1 tasks.go:76] ran task 5 of 15: UpdatingKubeStateMetrics I0423 21:51:21.969513 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/prometheus-k8s-grpc-tls-2atloh6agrukf -n openshift-monitoring because it was missing I0423 21:51:21.991993 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodDisruptionBudgetCreated' Created PodDisruptionBudget.policy/prometheus-k8s -n openshift-monitoring because it was missing I0423 21:51:22.009555 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/prometheus-trusted-ca-bundle -n openshift-monitoring because it was missing I0423 21:51:22.019912 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'SecretCreated' Created Secret/prometheus-k8s-additional-alertmanager-configs -n openshift-monitoring because it was missing I0423 21:51:30.718182 1 tasks.go:76] ran task 11 of 15: UpdatingConsolePluginComponents I0423 21:51:30.718210 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodDisruptionBudgetCreated' Created PodDisruptionBudget.policy/monitoring-plugin -n openshift-monitoring because it was missing I0423 21:51:32.278550 1 tasks.go:76] ran task 8 of 15: UpdatingTelemeterClient I0423 21:51:33.939861 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodDisruptionBudgetCreated' Created PodDisruptionBudget.policy/thanos-querier-pdb -n openshift-monitoring because it was missing I0423 21:51:33.977590 1 tasks.go:76] ran task 9 of 15: UpdatingThanosQuerier I0423 21:51:40.305532 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:40.321757 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:40.353839 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:40.368613 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:40.396418 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:40.422552 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:40.502752 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:40.713131 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:40.906688 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:41.104813 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:41.305530 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:41.505313 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:41.705958 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:41.903491 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:42.108221 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:51:52.414377 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'PodDisruptionBudgetCreated' Created PodDisruptionBudget.policy/metrics-server -n openshift-monitoring because it was missing I0423 21:51:52.427202 1 tasks.go:76] ran task 7 of 15: UpdatingMetricsServer I0423 21:51:52.427272 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'APIServiceCreated' Created APIService.apiregistration.k8s.io/v1beta1.metrics.k8s.io because it was missing I0423 21:52:06.983659 1 tasks.go:76] ran task 3 of 15: UpdatingAlertmanager I0423 21:52:32.077849 1 tasks.go:76] ran task 2 of 15: UpdatingPrometheus I0423 21:52:32.077874 1 tasks.go:49] processing task group 3 of 3 I0423 21:52:32.077889 1 tasks.go:70] running task 1 of 1: UpdatingConfigurationSharing I0423 21:52:32.139670 1 tasks.go:76] ran task 1 of 1: UpdatingConfigurationSharing I0423 21:52:32.139714 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ConfigMapCreated' Created ConfigMap/monitoring-shared-config -n openshift-config-managed because it was missing I0423 21:52:32.144807 1 operator.go:851] Updating ClusterOperator status to done. W0423 21:52:32.182238 1 operator.go:974] No Cluster Monitoring ConfigMap was found. Using defaults. I0423 21:52:32.219291 1 operator.go:830] Updating ClusterOperator status to InProgress. I0423 21:52:32.227750 1 tasks.go:49] processing task group 1 of 3 I0423 21:52:32.227776 1 tasks.go:70] running task 2 of 2: UpdatingPrometheusOperator I0423 21:52:32.227794 1 tasks.go:70] running task 1 of 2: UpdatingMetricsScrapingClientCA I0423 21:52:32.242552 1 tasks.go:76] ran task 1 of 2: UpdatingMetricsScrapingClientCA I0423 21:52:33.279522 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/prometheusrules.openshift.io" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"prometheus-operator-admission-webhook","namespace":"openshift-monitoring","path":"/admission-prometheusrules/validate","port":8443}},"failurePolicy":"Ignore","name":"prometheusrules.openshift.io","rules":[{"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["prometheusrules"],"scope":"Namespaced"}],"sideEffects":"None","timeoutSeconds":5}]} I0423 21:52:33.286799 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/prometheusrules.openshift.io because it changed I0423 21:52:33.291433 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/alertmanagerconfigs.openshift.io" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"prometheus-operator-admission-webhook","namespace":"openshift-monitoring","path":"/admission-alertmanagerconfigs/validate","port":8443}},"failurePolicy":"Ignore","name":"alertmanagerconfigs.openshift.io","rules":[{"apiGroups":["monitoring.coreos.com"],"apiVersions":["v1alpha1"],"operations":["CREATE","UPDATE"],"resources":["alertmanagerconfigs"],"scope":"Namespaced"}],"sideEffects":"None","timeoutSeconds":5}]} I0423 21:52:33.296670 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"openshift-monitoring", Name:"cluster-monitoring-operator", UID:"3e880c4f-97bd-4014-8003-bba5eff37f11", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/alertmanagerconfigs.openshift.io because it changed I0423 21:52:35.380883 1 tasks.go:76] ran task 2 of 2: UpdatingPrometheusOperator I0423 21:52:35.380910 1 tasks.go:49] processing task group 2 of 3 I0423 21:52:35.380932 1 tasks.go:70] running task 15 of 15: UpdatingUserWorkloadThanosRuler I0423 21:52:35.380996 1 tasks.go:70] running task 7 of 15: UpdatingMetricsServer I0423 21:52:35.381011 1 tasks.go:70] running task 3 of 15: UpdatingAlertmanager I0423 21:52:35.381031 1 tasks.go:70] running task 11 of 15: UpdatingConsolePluginComponents I0423 21:52:35.381054 1 tasks.go:70] running task 9 of 15: UpdatingThanosQuerier I0423 21:52:35.381070 1 tasks.go:70] running task 13 of 15: UpdatingUserWorkloadPrometheus I0423 21:52:35.381081 1 tasks.go:70] running task 2 of 15: UpdatingPrometheus I0423 21:52:35.381084 1 tasks.go:70] running task 1 of 15: UpdatingClusterMonitoringOperatorDeps I0423 21:52:35.381102 1 tasks.go:70] running task 10 of 15: UpdatingControlPlaneComponents I0423 21:52:35.381118 1 tasks.go:70] running task 12 of 15: UpdatingUserWorkloadPrometheusOperator I0423 21:52:35.381123 1 tasks.go:70] running task 14 of 15: UpdatingUserWorkloadAlertmanager I0423 21:52:35.381136 1 tasks.go:70] running task 5 of 15: UpdatingKubeStateMetrics I0423 21:52:35.381149 1 tasks.go:70] running task 4 of 15: UpdatingNodeExporter I0423 21:52:35.381055 1 tasks.go:70] running task 8 of 15: UpdatingTelemeterClient I0423 21:52:35.381183 1 tasks.go:70] running task 6 of 15: UpdatingOpenshiftStateMetrics I0423 21:52:35.440864 1 tasks.go:76] ran task 12 of 15: UpdatingUserWorkloadPrometheusOperator I0423 21:52:35.472768 1 tasks.go:76] ran task 14 of 15: UpdatingUserWorkloadAlertmanager I0423 21:52:35.472986 1 tasks.go:76] ran task 10 of 15: UpdatingControlPlaneComponents I0423 21:52:35.542562 1 tasks.go:76] ran task 1 of 15: UpdatingClusterMonitoringOperatorDeps I0423 21:52:36.467009 1 tasks.go:76] ran task 6 of 15: UpdatingOpenshiftStateMetrics I0423 21:52:36.578436 1 tasks.go:76] ran task 5 of 15: UpdatingKubeStateMetrics I0423 21:52:36.595350 1 tasks.go:76] ran task 15 of 15: UpdatingUserWorkloadThanosRuler I0423 21:52:36.654134 1 tasks.go:76] ran task 13 of 15: UpdatingUserWorkloadPrometheus I0423 21:52:36.654271 1 tasks.go:76] ran task 4 of 15: UpdatingNodeExporter I0423 21:52:38.623939 1 tasks.go:76] ran task 9 of 15: UpdatingThanosQuerier I0423 21:52:40.522247 1 tasks.go:76] ran task 7 of 15: UpdatingMetricsServer I0423 21:52:41.451322 1 tasks.go:76] ran task 11 of 15: UpdatingConsolePluginComponents I0423 21:52:41.571299 1 tasks.go:76] ran task 8 of 15: UpdatingTelemeterClient I0423 21:52:47.363718 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:52:47.384245 1 operator.go:647] Triggering an update due to a change in *v1.ClusterVersion/version I0423 21:53:36.719296 1 tasks.go:76] ran task 3 of 15: UpdatingAlertmanager I0423 21:54:50.777321 1 tasks.go:76] ran task 2 of 15: UpdatingPrometheus I0423 21:54:50.777352 1 tasks.go:49] processing task group 3 of 3 I0423 21:54:50.777367 1 tasks.go:70] running task 1 of 1: UpdatingConfigurationSharing I0423 21:54:50.812501 1 tasks.go:76] ran task 1 of 1: UpdatingConfigurationSharing I0423 21:54:50.817658 1 operator.go:851] Updating ClusterOperator status to done. W0423 21:54:50.826427 1 operator.go:974] No Cluster Monitoring ConfigMap was found. Using defaults. I0423 21:54:50.851846 1 operator.go:830] Updating ClusterOperator status to InProgress. I0423 21:54:50.855894 1 tasks.go:49] processing task group 1 of 3 I0423 21:54:50.855916 1 tasks.go:70] running task 2 of 2: UpdatingPrometheusOperator I0423 21:54:50.855930 1 tasks.go:70] running task 1 of 2: UpdatingMetricsScrapingClientCA I0423 21:54:50.868803 1 tasks.go:76] ran task 1 of 2: UpdatingMetricsScrapingClientCA I0423 21:54:53.983434 1 tasks.go:76] ran task 2 of 2: UpdatingPrometheusOperator I0423 21:54:53.983456 1 tasks.go:49] processing task group 2 of 3 I0423 21:54:53.983480 1 tasks.go:70] running task 15 of 15: UpdatingUserWorkloadThanosRuler I0423 21:54:53.983491 1 tasks.go:70] running task 4 of 15: UpdatingNodeExporter I0423 21:54:53.983504 1 tasks.go:70] running task 2 of 15: UpdatingPrometheus I0423 21:54:53.983520 1 tasks.go:70] running task 3 of 15: UpdatingAlertmanager I0423 21:54:53.983541 1 tasks.go:70] running task 9 of 15: UpdatingThanosQuerier I0423 21:54:53.983565 1 tasks.go:70] running task 6 of 15: UpdatingOpenshiftStateMetrics I0423 21:54:53.983582 1 tasks.go:70] running task 1 of 15: UpdatingClusterMonitoringOperatorDeps I0423 21:54:53.983605 1 tasks.go:70] running task 5 of 15: UpdatingKubeStateMetrics I0423 21:54:53.983615 1 tasks.go:70] running task 7 of 15: UpdatingMetricsServer I0423 21:54:53.983632 1 tasks.go:70] running task 8 of 15: UpdatingTelemeterClient I0423 21:54:53.983662 1 tasks.go:70] running task 12 of 15: UpdatingUserWorkloadPrometheusOperator I0423 21:54:53.983674 1 tasks.go:70] running task 10 of 15: UpdatingControlPlaneComponents I0423 21:54:53.983682 1 tasks.go:70] running task 13 of 15: UpdatingUserWorkloadPrometheus I0423 21:54:53.983702 1 tasks.go:70] running task 11 of 15: UpdatingConsolePluginComponents I0423 21:54:53.983723 1 tasks.go:70] running task 14 of 15: UpdatingUserWorkloadAlertmanager I0423 21:54:54.143075 1 tasks.go:76] ran task 12 of 15: UpdatingUserWorkloadPrometheusOperator I0423 21:54:54.185462 1 tasks.go:76] ran task 14 of 15: UpdatingUserWorkloadAlertmanager I0423 21:54:54.188489 1 tasks.go:76] ran task 10 of 15: UpdatingControlPlaneComponents I0423 21:54:54.297573 1 tasks.go:76] ran task 1 of 15: UpdatingClusterMonitoringOperatorDeps I0423 21:54:55.111705 1 tasks.go:76] ran task 13 of 15: UpdatingUserWorkloadPrometheus I0423 21:54:55.176522 1 tasks.go:76] ran task 15 of 15: UpdatingUserWorkloadThanosRuler I0423 21:54:55.179965 1 tasks.go:76] ran task 5 of 15: UpdatingKubeStateMetrics I0423 21:54:55.180892 1 tasks.go:76] ran task 6 of 15: UpdatingOpenshiftStateMetrics I0423 21:54:55.245312 1 tasks.go:76] ran task 4 of 15: UpdatingNodeExporter I0423 21:54:57.217940 1 tasks.go:76] ran task 9 of 15: UpdatingThanosQuerier I0423 21:54:59.216566 1 tasks.go:76] ran task 7 of 15: UpdatingMetricsServer I0423 21:55:00.069603 1 tasks.go:76] ran task 11 of 15: UpdatingConsolePluginComponents I0423 21:55:00.250567 1 tasks.go:76] ran task 8 of 15: UpdatingTelemeterClient I0423 21:55:05.219033 1 tasks.go:76] ran task 3 of 15: UpdatingAlertmanager I0423 21:55:09.424334 1 tasks.go:76] ran task 2 of 15: UpdatingPrometheus I0423 21:55:09.424360 1 tasks.go:49] processing task group 3 of 3 I0423 21:55:09.424376 1 tasks.go:70] running task 1 of 1: UpdatingConfigurationSharing I0423 21:55:09.458389 1 tasks.go:76] ran task 1 of 1: UpdatingConfigurationSharing I0423 21:55:09.463631 1 operator.go:851] Updating ClusterOperator status to done.