apiVersion: v1
kind: Pod
metadata:
annotations:
cni.projectcalico.org/podIP: ''
cni.projectcalico.org/podIPs: ''
prometheus.io/path: /metrics
prometheus.io/port: '9402'
prometheus.io/scrape: 'true'
creationTimestamp: '2024-04-28T13:45:14Z'
generateName: cert-manager-65cdc7fd85-
labels:
app: cert-manager
app.kubernetes.io/component: controller
app.kubernetes.io/instance: cert-manager
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: cert-manager
app.kubernetes.io/version: v1.9.1
helm.sh/chart: cert-manager-v1.9.1
pod-template-hash: 65cdc7fd85
managedFields:
- apiVersion: v1
fieldsType: FieldsV1
fieldsV1:
f:metadata:
f:annotations:
f:cni.projectcalico.org/podIP: {}
f:cni.projectcalico.org/podIPs: {}
manager: calico
operation: Update
time: '2024-04-28T13:45:17Z'
- apiVersion: v1
fieldsType: FieldsV1
fieldsV1:
f:metadata:
f:annotations:
.: {}
f:prometheus.io/path: {}
f:prometheus.io/port: {}
f:prometheus.io/scrape: {}
f:generateName: {}
f:labels:
.: {}
f:app: {}
f:app.kubernetes.io/component: {}
f:app.kubernetes.io/instance: {}
f:app.kubernetes.io/managed-by: {}
f:app.kubernetes.io/name: {}
f:app.kubernetes.io/version: {}
f:helm.sh/chart: {}
f:pod-template-hash: {}
f:ownerReferences:
.: {}
k:{"uid":"ecabbbff-e7a9-427f-a524-e662539982bd"}:
.: {}
f:apiVersion: {}
f:blockOwnerDeletion: {}
f:controller: {}
f:kind: {}
f:name: {}
f:uid: {}
f:spec:
f:containers:
k:{"name":"cert-manager"}:
.: {}
f:args: {}
f:env:
.: {}
k:{"name":"POD_NAMESPACE"}:
.: {}
f:name: {}
f:valueFrom:
.: {}
f:fieldRef:
.: {}
f:apiVersion: {}
f:fieldPath: {}
f:image: {}
f:imagePullPolicy: {}
f:name: {}
f:ports:
.: {}
k:{"containerPort":9402,"protocol":"TCP"}:
.: {}
f:containerPort: {}
f:name: {}
f:protocol: {}
f:resources:
.: {}
f:requests:
.: {}
f:cpu: {}
f:memory: {}
f:securityContext:
.: {}
f:allowPrivilegeEscalation: {}
f:terminationMessagePath: {}
f:terminationMessagePolicy: {}
f:dnsConfig:
.: {}
f:nameservers: {}
f:dnsPolicy: {}
f:enableServiceLinks: {}
f:nodeSelector:
.: {}
f:kubernetes.io/os: {}
f:restartPolicy: {}
f:schedulerName: {}
f:securityContext:
.: {}
f:runAsNonRoot: {}
f:serviceAccount: {}
f:serviceAccountName: {}
f:terminationGracePeriodSeconds: {}
f:status:
f:conditions:
k:{"type":"ContainersReady"}:
.: {}
f:lastProbeTime: {}
f:lastTransitionTime: {}
f:status: {}
f:type: {}
k:{"type":"Initialized"}:
.: {}
f:lastProbeTime: {}
f:lastTransitionTime: {}
f:status: {}
f:type: {}
k:{"type":"Ready"}:
.: {}
f:lastProbeTime: {}
f:lastTransitionTime: {}
f:status: {}
f:type: {}
f:containerStatuses: {}
f:hostIP: {}
f:phase: {}
f:podIP: {}
f:podIPs:
.: {}
k:{"ip":"172.18.117.197"}:
.: {}
f:ip: {}
f:startTime: {}
manager: k3s
operation: Update
time: '2025-10-19T10:16:26Z'
name: cert-manager-65cdc7fd85-6l55n
namespace: cert-manager
ownerReferences:
- apiVersion: apps/v1
blockOwnerDeletion: true
controller: true
kind: ReplicaSet
name: cert-manager-65cdc7fd85
uid: ecabbbff-e7a9-427f-a524-e662539982bd
resourceVersion: '3508118541'
uid: 0c64ded1-5de9-467a-bd18-72baf12ab236
spec:
containers:
- args:
- --v=2
- --cluster-resource-namespace=$(POD_NAMESPACE)
- --leader-election-namespace=kube-system
env:
- name: POD_NAMESPACE
valueFrom:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
image: quay.io/jetstack/cert-manager-controller:v1.9.1
imagePullPolicy: IfNotPresent
name: cert-manager
ports:
- containerPort: 9402
name: http-metrics
protocol: TCP
resources:
requests:
cpu: 50m
memory: 64Mi
securityContext:
allowPrivilegeEscalation: false
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: File
volumeMounts:
- mountPath: /var/run/secrets/kubernetes.io/serviceaccount
name: kube-api-access-9grs4
readOnly: true
dnsConfig:
nameservers:
- 1.1.1.1
- 1.0.0.1
dnsPolicy: None
enableServiceLinks: true
nodeName: sed-infra-server-master-mcg58ax2-aa1e3892
nodeSelector:
kubernetes.io/os: linux
preemptionPolicy: PreemptLowerPriority
priority: 0
restartPolicy: Always
schedulerName: default-scheduler
securityContext:
runAsNonRoot: true
serviceAccount: cert-manager
serviceAccountName: cert-manager
terminationGracePeriodSeconds: 30
tolerations:
- effect: NoExecute
key: node.kubernetes.io/not-ready
operator: Exists
tolerationSeconds: 300
- effect: NoExecute
key: node.kubernetes.io/unreachable
operator: Exists
tolerationSeconds: 300
volumes:
- name: kube-api-access-9grs4
projected:
defaultMode: 420
sources:
- serviceAccountToken:
expirationSeconds: 3607
path: token
- configMap:
items:
- key: ca.crt
path: ca.crt
name: kube-root-ca.crt
- downwardAPI:
items:
- fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
path: namespace
status:
conditions:
- lastProbeTime: null
lastTransitionTime: '2024-04-28T13:45:15Z'
status: 'True'
type: Initialized
- lastProbeTime: null
lastTransitionTime: '2025-10-19T10:15:51Z'
status: 'True'
type: Ready
- lastProbeTime: null
lastTransitionTime: '2025-10-19T10:15:51Z'
status: 'True'
type: ContainersReady
- lastProbeTime: null
lastTransitionTime: '2024-04-28T13:45:14Z'
status: 'True'
type: PodScheduled
containerStatuses:
- containerID: containerd://a816c5f6e8f073e782826a86ab7d81cb096491efc43a372f2cc5785dddf325af
image: quay.io/jetstack/cert-manager-controller:v1.9.1
imageID: quay.io/jetstack/cert-manager-controller@sha256:cd9bf3d48b6b8402a2a8b11953f9dc0275ba4beec14da47e31823a0515cde7e2
lastState:
terminated:
containerID: containerd://dec56eb52652b6e37487818ee0b3623d433c0c242e09a68f3fc90b32034a5932
exitCode: 255
finishedAt: '2025-10-19T10:15:24Z'
reason: Unknown
startedAt: '2025-10-10T05:13:02Z'
name: cert-manager
ready: true
restartCount: 14
started: true
state:
running:
startedAt: '2025-10-19T10:15:50Z'
hostIP: 192.168.1.3
phase: Running
podIP: 172.18.117.197
podIPs:
- ip: 172.18.117.197
qosClass: Burstable
startTime: '2024-04-28T13:45:15Z'