Name: cert-manager-webhook-548949fc64-hlpnw Namespace: cert-manager Priority: 0 Service Account: cert-manager-webhook Node: instance/162.253.55.62 Start Time: Mon, 09 Mar 2026 01:39:06 +0000 Labels: app=webhook app.kubernetes.io/component=webhook app.kubernetes.io/instance=cert-manager app.kubernetes.io/managed-by=Helm app.kubernetes.io/name=webhook app.kubernetes.io/version=v1.11.5 helm.sh/chart=cert-manager-v1.11.5 pod-template-hash=548949fc64 Annotations: Status: Running SeccompProfile: RuntimeDefault IP: 10.0.0.230 IPs: IP: 10.0.0.230 Controlled By: ReplicaSet/cert-manager-webhook-548949fc64 Containers: cert-manager-webhook: Container ID: containerd://f9c27b754faddf8414e9702710ecd7b799a7621489cf8772261479fb01c14e57 Image: harbor.atmosphere.dev/quay.io/jetstack/cert-manager-webhook:v1.12.17 Image ID: harbor.atmosphere.dev/quay.io/jetstack/cert-manager-webhook@sha256:52fdb4f4cd75c4fe3bb1308d7c363bae5cfe6be425b6469722e0f9e6a65022ae Ports: 10250/TCP, 6080/TCP Host Ports: 0/TCP, 0/TCP Args: --v=2 --secure-port=10250 --feature-gates=AdditionalCertificateOutputFormats=true --dynamic-serving-ca-secret-namespace=$(POD_NAMESPACE) --dynamic-serving-ca-secret-name=cert-manager-webhook-ca --dynamic-serving-dns-names=cert-manager-webhook --dynamic-serving-dns-names=cert-manager-webhook.$(POD_NAMESPACE) --dynamic-serving-dns-names=cert-manager-webhook.$(POD_NAMESPACE).svc --feature-gates=AdditionalCertificateOutputFormats=true State: Running Started: Mon, 09 Mar 2026 01:39:17 +0000 Ready: True Restart Count: 0 Liveness: http-get http://:6080/livez delay=60s timeout=1s period=10s #success=1 #failure=3 Readiness: http-get http://:6080/healthz delay=5s timeout=1s period=5s #success=1 #failure=3 Environment: POD_NAMESPACE: cert-manager (v1:metadata.namespace) Mounts: /var/run/secrets/kubernetes.io/serviceaccount from kube-api-access-9sh9b (ro) Conditions: Type Status Initialized True Ready True ContainersReady True PodScheduled True Volumes: kube-api-access-9sh9b: Type: Projected (a volume that contains injected data from multiple sources) TokenExpirationSeconds: 3607 ConfigMapName: kube-root-ca.crt ConfigMapOptional: DownwardAPI: true QoS Class: BestEffort Node-Selectors: kubernetes.io/os=linux openstack-control-plane=enabled Tolerations: node.kubernetes.io/not-ready:NoExecute op=Exists for 300s node.kubernetes.io/unreachable:NoExecute op=Exists for 300s Events: Type Reason Age From Message ---- ------ ---- ---- ------- Warning FailedScheduling 23m default-scheduler 0/1 nodes are available: 1 node(s) had untolerated taint {node.kubernetes.io/not-ready: }. preemption: 0/1 nodes are available: 1 Preemption is not helpful for scheduling.. Normal Scheduled 23m default-scheduler Successfully assigned cert-manager/cert-manager-webhook-548949fc64-hlpnw to instance Normal Pulling 23m kubelet Pulling image "harbor.atmosphere.dev/quay.io/jetstack/cert-manager-webhook:v1.12.17" Normal Pulled 23m kubelet Successfully pulled image "harbor.atmosphere.dev/quay.io/jetstack/cert-manager-webhook:v1.12.17" in 989ms (5.68s including waiting) Normal Created 23m kubelet Created container cert-manager-webhook Normal Started 23m kubelet Started container cert-manager-webhook