W0506 20:49:09.602297 1 cmd.go:257] Using insecure, self-signed certificates I0506 20:49:09.602407 1 crypto.go:600] Generating new CA for cert-manager-operator-signer@1778100549 cert, and key in /tmp/serving-cert-472589947/serving-signer.crt, /tmp/serving-cert-472589947/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1778100549" is unset, resetting to 43800h0m0s! I0506 20:49:09.718771 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0506 20:49:09.718978 1 observer_polling.go:159] Starting file observer I0506 20:49:09.741117 1 builder.go:304] cert-manager-operator version - I0506 20:49:09.741569 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-472589947/tls.crt::/tmp/serving-cert-472589947/tls.key" I0506 20:49:09.867397 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0506 20:49:09.874413 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0506 20:49:09.874429 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0506 20:49:09.874446 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0506 20:49:09.874450 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0506 20:49:09.877004 1 secure_serving.go:57] Forcing use of http/1.1 only I0506 20:49:09.877015 1 genericapiserver.go:552] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete I0506 20:49:09.881794 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0506 20:49:09.881812 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0506 20:49:09.881842 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0506 20:49:09.881850 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0506 20:49:09.881849 1 shared_informer.go:349] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0506 20:49:09.881859 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0506 20:49:09.882073 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-472589947/tls.crt::/tmp/serving-cert-472589947/tls.key" I0506 20:49:09.882124 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-472589947/tls.crt::/tmp/serving-cert-472589947/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778100549\" (2026-05-06 20:49:08 +0000 UTC to 2026-05-06 20:49:09 +0000 UTC (now=2026-05-06 20:49:09.882106249 +0000 UTC))" I0506 20:49:09.882314 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778100549\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778100549\" (2026-05-06 19:49:09 +0000 UTC to 2029-05-06 19:49:09 +0000 UTC (now=2026-05-06 20:49:09.882300286 +0000 UTC))" I0506 20:49:09.882335 1 secure_serving.go:211] Serving securely on [::]:8443 I0506 20:49:09.882359 1 genericapiserver.go:702] [graceful-termination] waiting for shutdown to be initiated I0506 20:49:09.882365 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0506 20:49:09.882740 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0506 20:49:09.884778 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0506 20:49:09.887486 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0506 20:49:09.887488 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0506 20:49:09.896033 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0506 20:49:09.896089 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"8707a616-2e2f-4dbd-8ca2-0d642a85023f", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"26821", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-665bb775dc-9t746_e0268749-e0bd-4046-b743-69af1bc71e90 became leader I0506 20:49:09.909656 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0506 20:49:09.909743 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0506 20:49:09.909770 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0506 20:49:09.909779 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0506 20:49:09.909800 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0506 20:49:09.909949 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0506 20:49:09.910219 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0506 20:49:09.910705 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0506 20:49:09.910757 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0506 20:49:09.914998 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.939157 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.939199 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.939219 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.939249 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.939392 1 reflector.go:439] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0506 20:49:09.939473 1 reflector.go:439] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0506 20:49:09.940185 1 reflector.go:439] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.940214 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.940296 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.940578 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.941481 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.953125 1 features.go:133] "cluster featureset: spec.featureSet not in allowed list" logger="features" featureSet="" I0506 20:49:09.953141 1 features.go:195] "cluster feature gate: preview featureset not enabled" logger="features" feature="TrustManager" I0506 20:49:09.953147 1 setup_manager.go:121] "setting up unified operator manager" logger="setup-manager" I0506 20:49:09.953153 1 setup_manager.go:122] "controller" logger="setup-manager" version="" I0506 20:49:09.953159 1 setup_manager.go:123] "enabled controllers" logger="setup-manager" istioCSR=true trustManager=false I0506 20:49:09.953366 1 reflector.go:439] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.953714 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.968554 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0506 20:49:09.978437 1 setup_manager.go:156] "setting up controller" logger="setup-manager" name="cert-manager-istio-csr-controller" I0506 20:49:09.978524 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0506 20:49:09.978619 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0506 20:49:09.978757 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0506 20:49:09.978765 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0506 20:49:09.978758 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterIssuer" I0506 20:49:09.978779 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0506 20:49:09.978797 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Issuer" I0506 20:49:09.978784 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0506 20:49:09.978779 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0506 20:49:09.978794 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0506 20:49:09.978845 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0506 20:49:09.978851 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0506 20:49:09.978833 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0506 20:49:09.978851 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0506 20:49:09.978786 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0506 20:49:09.978850 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0506 20:49:09.982582 1 shared_informer.go:356] "Caches are synced" controller="RequestHeaderAuthRequestController" I0506 20:49:09.982592 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0506 20:49:09.982608 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0506 20:49:09.982771 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-06 20:19:38 +0000 UTC to 2036-05-03 20:19:38 +0000 UTC (now=2026-05-06 20:49:09.982746584 +0000 UTC))" I0506 20:49:09.982951 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-472589947/tls.crt::/tmp/serving-cert-472589947/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778100549\" (2026-05-06 20:49:08 +0000 UTC to 2026-05-06 20:49:09 +0000 UTC (now=2026-05-06 20:49:09.98294234 +0000 UTC))" I0506 20:49:09.983079 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778100549\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778100549\" (2026-05-06 19:49:09 +0000 UTC to 2029-05-06 19:49:09 +0000 UTC (now=2026-05-06 20:49:09.983070179 +0000 UTC))" I0506 20:49:09.983171 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-05-06 20:19:38 +0000 UTC to 2036-05-03 20:19:38 +0000 UTC (now=2026-05-06 20:49:09.983163628 +0000 UTC))" I0506 20:49:09.983183 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-05-06 20:19:39 +0000 UTC to 2036-05-03 20:19:39 +0000 UTC (now=2026-05-06 20:49:09.983178114 +0000 UTC))" I0506 20:49:09.983195 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-05-06 20:19:40 +0000 UTC to 2036-05-03 20:19:40 +0000 UTC (now=2026-05-06 20:49:09.983189226 +0000 UTC))" I0506 20:49:09.983207 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-05-06 20:19:40 +0000 UTC to 2036-05-03 20:19:40 +0000 UTC (now=2026-05-06 20:49:09.983201942 +0000 UTC))" I0506 20:49:09.983218 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-05-06 20:19:40 +0000 UTC to 2036-05-03 20:19:40 +0000 UTC (now=2026-05-06 20:49:09.983212696 +0000 UTC))" I0506 20:49:09.983233 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2q4l66j7kcv64l0haf9hnjed3rf79558-kx-2371138082_customer-system-admin-signer@1778098791\" [] issuer=\"\" (2026-05-06 20:19:50 +0000 UTC to 2026-05-13 20:19:51 +0000 UTC (now=2026-05-06 20:49:09.983222397 +0000 UTC))" I0506 20:49:09.983245 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2q4l66j7kcv64l0haf9hnjed3rf79558-kx-2371138082_sre-system-admin-signer@1778098791\" [] issuer=\"\" (2026-05-06 20:19:50 +0000 UTC to 2026-05-13 20:19:51 +0000 UTC (now=2026-05-06 20:49:09.983238848 +0000 UTC))" I0506 20:49:09.983258 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-06 20:19:38 +0000 UTC to 2036-05-03 20:19:38 +0000 UTC (now=2026-05-06 20:49:09.983248599 +0000 UTC))" I0506 20:49:09.983375 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-472589947/tls.crt::/tmp/serving-cert-472589947/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778100549\" (2026-05-06 20:49:08 +0000 UTC to 2026-05-06 20:49:09 +0000 UTC (now=2026-05-06 20:49:09.983368904 +0000 UTC))" I0506 20:49:09.983492 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778100549\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778100549\" (2026-05-06 19:49:09 +0000 UTC to 2029-05-06 19:49:09 +0000 UTC (now=2026-05-06 20:49:09.98348579 +0000 UTC))" I0506 20:49:09.988793 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:09.988799 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:09.988808 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:09.988833 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:09.988796 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:09.988936 1 reflector.go:439] "Caches populated" type="*v1.Issuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:09.988981 1 reflector.go:439] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:09.989060 1 reflector.go:439] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:09.989426 1 reflector.go:439] "Caches populated" type="*v1.ClusterIssuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:10.009914 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0506 20:49:10.009923 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment I0506 20:49:10.009928 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... I0506 20:49:10.009929 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... I0506 20:49:10.009954 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0506 20:49:10.009959 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0506 20:49:10.009999 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0506 20:49:10.010009 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... I0506 20:49:10.011103 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources I0506 20:49:10.011116 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... I0506 20:49:10.011109 1 base_controller.go:82] Caches are synced for DefaultCertManager I0506 20:49:10.011120 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0506 20:49:10.011117 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0506 20:49:10.011127 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... I0506 20:49:10.011131 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... I0506 20:49:10.011136 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0506 20:49:10.011125 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0506 20:49:10.011155 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... E0506 20:49:10.011191 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0506 20:49:10.011192 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0506 20:49:10.011195 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0506 20:49:10.011192 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0506 20:49:10.011330 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager E0506 20:49:10.016516 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0506 20:49:10.017588 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0506 20:49:10.017608 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0506 20:49:10.017621 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0506 20:49:10.018765 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:10.018927 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:10.018953 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" E0506 20:49:10.027070 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0506 20:49:10.028213 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0506 20:49:10.029286 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0506 20:49:10.029302 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0506 20:49:10.037977 1 reflector.go:439] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" E0506 20:49:10.047623 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0506 20:49:10.164196 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0506 20:49:10.183167 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceCreated' Created Namespace/cert-manager because it was missing I0506 20:49:10.291711 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0506 20:49:10.377700 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0506 20:49:10.378807 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0506 20:49:10.379964 1 controller.go:286] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0506 20:49:10.379980 1 controller.go:289] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0506 20:49:10.513578 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0506 20:49:10.550932 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0506 20:49:10.616850 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0506 20:49:10.997158 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0506 20:49:11.022045 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0506 20:49:11.548710 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0506 20:49:11.758918 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0506 20:49:12.036797 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0506 20:49:12.126973 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0506 20:49:12.775859 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0506 20:49:13.006129 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0506 20:49:13.192011 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0506 20:49:13.227296 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing E0506 20:49:13.957327 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-deployment reconciliation failed: Operation cannot be fulfilled on certmanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again" I0506 20:49:13.997311 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0506 20:49:14.036203 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0506 20:49:14.176948 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing I0506 20:49:14.575652 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0506 20:49:15.101209 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing E0506 20:49:15.149979 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0506 20:49:15.187581 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0506 20:49:15.311759 1 request.go:752] "Waited before sending request" delay="1.134765864s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0506 20:49:15.657729 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0506 20:49:15.786634 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0506 20:49:15.859560 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0506 20:49:15.958860 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing E0506 20:49:16.327371 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0506 20:49:16.764964 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0506 20:49:17.750993 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0506 20:49:18.385692 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0506 20:49:18.571787 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0506 20:49:19.164972 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0506 20:49:19.910997 1 request.go:752] "Waited before sending request" delay="1.165285743s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0506 20:49:19.952523 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0506 20:49:20.763068 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0506 20:49:21.544857 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0506 20:49:21.711700 1 request.go:752] "Waited before sending request" delay="1.19180193s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0506 20:49:22.387106 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0506 20:49:22.400254 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0506 20:49:22.433222 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0506 20:49:22.718726 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0506 20:49:23.311574 1 request.go:752] "Waited before sending request" delay="1.159182316s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0506 20:49:23.358162 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0506 20:49:24.168718 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0506 20:49:25.034787 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0506 20:49:25.958987 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0506 20:49:26.561665 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0506 20:49:27.350179 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0506 20:49:28.510863 1 request.go:752] "Waited before sending request" delay="1.160726691s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0506 20:49:29.511856 1 request.go:752] "Waited before sending request" delay="1.15516786s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" E0506 20:49:29.941307 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-tokenrequest-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0506 20:49:30.711382 1 request.go:752] "Waited before sending request" delay="1.190139193s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-controller-deployment-reportDegraded&force=true" I0506 20:49:33.266497 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0506 20:49:33.755756 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0506 20:49:34.111344 1 request.go:752] "Waited before sending request" delay="1.163389742s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0506 20:49:38.511577 1 request.go:752] "Waited before sending request" delay="1.192629017s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-controller-deployment-reportDegraded&force=true" I0506 20:49:39.591949 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0506 20:49:39.638800 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0506 20:49:39.671735 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0506 20:49:39.690788 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"b737951e-7228-45f3-82bd-748a140dd322", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0506 20:49:39.711296 1 request.go:752] "Waited before sending request" delay="1.167924452s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0506 20:49:59.718635 1 request.go:752] "Waited before sending request" delay="1.170523828s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0506 20:59:11.947702 1 request.go:752] "Waited before sending request" delay="1.182926079s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster"