W0507 02:55:35.467547 1 cmd.go:257] Using insecure, self-signed certificates I0507 02:55:35.467732 1 crypto.go:600] Generating new CA for cert-manager-operator-signer@1778122535 cert, and key in /tmp/serving-cert-337101009/serving-signer.crt, /tmp/serving-cert-337101009/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1778122535" is unset, resetting to 43800h0m0s! I0507 02:55:35.614374 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0507 02:55:35.614635 1 observer_polling.go:159] Starting file observer I0507 02:55:35.643889 1 builder.go:304] cert-manager-operator version - I0507 02:55:35.644422 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-337101009/tls.crt::/tmp/serving-cert-337101009/tls.key" I0507 02:55:35.815943 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0507 02:55:35.823638 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0507 02:55:35.823650 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0507 02:55:35.823664 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0507 02:55:35.823667 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0507 02:55:35.826959 1 secure_serving.go:57] Forcing use of http/1.1 only I0507 02:55:35.826974 1 genericapiserver.go:552] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete I0507 02:55:35.833077 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0507 02:55:35.833379 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0507 02:55:35.833384 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0507 02:55:35.833408 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0507 02:55:35.833430 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0507 02:55:35.833430 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0507 02:55:35.833430 1 shared_informer.go:349] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0507 02:55:35.833712 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-337101009/tls.crt::/tmp/serving-cert-337101009/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778122535\" (2026-05-07 02:55:34 +0000 UTC to 2026-05-07 02:55:35 +0000 UTC (now=2026-05-07 02:55:35.83368491 +0000 UTC))" I0507 02:55:35.833717 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-337101009/tls.crt::/tmp/serving-cert-337101009/tls.key" I0507 02:55:35.833863 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778122535\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778122535\" (2026-05-07 01:55:35 +0000 UTC to 2029-05-07 01:55:35 +0000 UTC (now=2026-05-07 02:55:35.833844774 +0000 UTC))" I0507 02:55:35.833880 1 secure_serving.go:211] Serving securely on [::]:8443 I0507 02:55:35.833894 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0507 02:55:35.833896 1 genericapiserver.go:702] [graceful-termination] waiting for shutdown to be initiated I0507 02:55:35.836673 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0507 02:55:35.836951 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0507 02:55:35.836969 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0507 02:55:35.846453 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0507 02:55:35.846506 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"b94493da-06ae-4bee-9b4f-336f5ef49347", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"29094", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-665bb775dc-7nxms_67e19265-0a98-437c-89d6-956cf6b43532 became leader I0507 02:55:35.856735 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0507 02:55:35.857522 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0507 02:55:35.857789 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0507 02:55:35.857723 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0507 02:55:35.858106 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0507 02:55:35.858561 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0507 02:55:35.858706 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0507 02:55:35.858912 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0507 02:55:35.859067 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0507 02:55:35.860113 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.862418 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.863540 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.863602 1 reflector.go:439] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0507 02:55:35.863754 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.863986 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.864956 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.865190 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.865941 1 reflector.go:439] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.869187 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.869734 1 features.go:133] "cluster featureset: spec.featureSet not in allowed list" logger="features" featureSet="" I0507 02:55:35.869751 1 features.go:195] "cluster feature gate: preview featureset not enabled" logger="features" feature="TrustManager" I0507 02:55:35.869759 1 setup_manager.go:121] "setting up unified operator manager" logger="setup-manager" I0507 02:55:35.869767 1 setup_manager.go:122] "controller" logger="setup-manager" version="" I0507 02:55:35.869776 1 setup_manager.go:123] "enabled controllers" logger="setup-manager" istioCSR=true trustManager=false I0507 02:55:35.870266 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.872407 1 reflector.go:439] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.875774 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.884282 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0507 02:55:35.893226 1 setup_manager.go:156] "setting up controller" logger="setup-manager" name="cert-manager-istio-csr-controller" I0507 02:55:35.893308 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0507 02:55:35.893402 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0507 02:55:35.893524 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0507 02:55:35.893534 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0507 02:55:35.893544 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0507 02:55:35.893553 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0507 02:55:35.893558 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0507 02:55:35.893563 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Issuer" I0507 02:55:35.893576 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0507 02:55:35.893570 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0507 02:55:35.893530 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterIssuer" I0507 02:55:35.893626 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0507 02:55:35.893631 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0507 02:55:35.893560 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0507 02:55:35.893645 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0507 02:55:35.893613 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0507 02:55:35.899410 1 reflector.go:439] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0507 02:55:35.899412 1 reflector.go:439] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.899643 1 reflector.go:439] "Caches populated" type="*v1.Issuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.903579 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.903595 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.903601 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.903605 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.903602 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.903611 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.903637 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.903854 1 reflector.go:439] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.905535 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.925420 1 reflector.go:439] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.934024 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0507 02:55:35.934044 1 shared_informer.go:356] "Caches are synced" controller="RequestHeaderAuthRequestController" I0507 02:55:35.934048 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0507 02:55:35.934172 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-07 02:24:33 +0000 UTC to 2036-05-04 02:24:33 +0000 UTC (now=2026-05-07 02:55:35.934153796 +0000 UTC))" I0507 02:55:35.934334 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-337101009/tls.crt::/tmp/serving-cert-337101009/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778122535\" (2026-05-07 02:55:34 +0000 UTC to 2026-05-07 02:55:35 +0000 UTC (now=2026-05-07 02:55:35.934321308 +0000 UTC))" I0507 02:55:35.934464 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778122535\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778122535\" (2026-05-07 01:55:35 +0000 UTC to 2029-05-07 01:55:35 +0000 UTC (now=2026-05-07 02:55:35.934454592 +0000 UTC))" I0507 02:55:35.934559 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-05-07 02:24:33 +0000 UTC to 2036-05-04 02:24:33 +0000 UTC (now=2026-05-07 02:55:35.934551488 +0000 UTC))" I0507 02:55:35.934575 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-05-07 02:24:35 +0000 UTC to 2036-05-04 02:24:35 +0000 UTC (now=2026-05-07 02:55:35.934568783 +0000 UTC))" I0507 02:55:35.934587 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-05-07 02:24:35 +0000 UTC to 2036-05-04 02:24:35 +0000 UTC (now=2026-05-07 02:55:35.934580659 +0000 UTC))" I0507 02:55:35.934599 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-05-07 02:24:35 +0000 UTC to 2036-05-04 02:24:35 +0000 UTC (now=2026-05-07 02:55:35.934593406 +0000 UTC))" I0507 02:55:35.934609 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-05-07 02:24:36 +0000 UTC to 2036-05-04 02:24:36 +0000 UTC (now=2026-05-07 02:55:35.934602054 +0000 UTC))" I0507 02:55:35.934622 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2q4qhbssukeip9ev6dq1dj1q9be81aiu-kx-7fa6e89444_customer-system-admin-signer@1778120687\" [] issuer=\"\" (2026-05-07 02:24:46 +0000 UTC to 2026-05-14 02:24:47 +0000 UTC (now=2026-05-07 02:55:35.934615688 +0000 UTC))" I0507 02:55:35.934631 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2q4qhbssukeip9ev6dq1dj1q9be81aiu-kx-7fa6e89444_sre-system-admin-signer@1778120687\" [] issuer=\"\" (2026-05-07 02:24:46 +0000 UTC to 2026-05-14 02:24:47 +0000 UTC (now=2026-05-07 02:55:35.934625715 +0000 UTC))" I0507 02:55:35.934640 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-07 02:24:33 +0000 UTC to 2036-05-04 02:24:33 +0000 UTC (now=2026-05-07 02:55:35.93463486 +0000 UTC))" I0507 02:55:35.934758 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-337101009/tls.crt::/tmp/serving-cert-337101009/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778122535\" (2026-05-07 02:55:34 +0000 UTC to 2026-05-07 02:55:35 +0000 UTC (now=2026-05-07 02:55:35.934751245 +0000 UTC))" I0507 02:55:35.934875 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778122535\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778122535\" (2026-05-07 01:55:35 +0000 UTC to 2029-05-07 01:55:35 +0000 UTC (now=2026-05-07 02:55:35.934867946 +0000 UTC))" I0507 02:55:35.937042 1 reflector.go:439] "Caches populated" type="*v1.ClusterIssuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:35.957014 1 base_controller.go:82] Caches are synced for DefaultCertManager I0507 02:55:35.957026 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0507 02:55:35.957208 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager I0507 02:55:35.958598 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0507 02:55:35.958612 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... I0507 02:55:35.958615 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment I0507 02:55:35.958625 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... I0507 02:55:35.958683 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0507 02:55:35.958707 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0507 02:55:35.958711 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0507 02:55:35.958717 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... I0507 02:55:35.958715 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0507 02:55:35.958726 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... I0507 02:55:35.958741 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0507 02:55:35.958761 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... E0507 02:55:35.958782 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0507 02:55:35.958832 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0507 02:55:35.958948 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0507 02:55:35.958955 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... E0507 02:55:35.959004 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0507 02:55:35.959148 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources I0507 02:55:35.959154 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... E0507 02:55:35.959181 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0507 02:55:35.963914 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0507 02:55:35.966141 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0507 02:55:35.966141 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0507 02:55:35.966173 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0507 02:55:36.006859 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceCreated' Created Namespace/cert-manager because it was missing I0507 02:55:36.006947 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0507 02:55:36.055562 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0507 02:55:36.094171 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing I0507 02:55:36.133380 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0507 02:55:36.175243 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0507 02:55:36.195043 1 controller.go:286] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0507 02:55:36.195061 1 controller.go:289] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0507 02:55:36.235748 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0507 02:55:36.268612 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0507 02:55:36.317922 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0507 02:55:37.167960 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0507 02:55:37.616105 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0507 02:55:37.668275 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0507 02:55:37.691050 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0507 02:55:38.068885 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0507 02:55:39.207529 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing E0507 02:55:39.513971 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-deployment reconciliation failed: Operation cannot be fulfilled on certmanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again" I0507 02:55:39.631658 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0507 02:55:39.974769 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0507 02:55:40.022349 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0507 02:55:40.120660 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0507 02:55:40.164181 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing I0507 02:55:40.299974 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0507 02:55:40.458251 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0507 02:55:40.460437 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing I0507 02:55:40.671321 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0507 02:55:40.875403 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0507 02:55:41.178839 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0507 02:55:41.581494 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0507 02:55:41.657855 1 request.go:752] "Waited before sending request" delay="1.167233104s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0507 02:55:41.939818 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing E0507 02:55:42.276035 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0507 02:55:42.354841 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0507 02:55:42.658343 1 request.go:752] "Waited before sending request" delay="1.182624662s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" E0507 02:55:42.679236 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0507 02:55:43.221454 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0507 02:55:43.985977 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0507 02:55:44.150432 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0507 02:55:44.347830 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0507 02:55:45.418949 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0507 02:55:46.035137 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0507 02:55:46.266037 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0507 02:55:46.658150 1 request.go:752] "Waited before sending request" delay="1.12269977s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0507 02:55:46.756280 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0507 02:55:46.770783 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0507 02:55:46.801650 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0507 02:55:47.065928 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0507 02:55:47.858141 1 request.go:752] "Waited before sending request" delay="1.191813543s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" I0507 02:55:47.882200 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0507 02:55:47.889508 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0507 02:55:47.896960 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0507 02:55:47.904075 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0507 02:55:47.944221 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0507 02:55:49.134134 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0507 02:55:49.935274 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0507 02:55:50.355079 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0507 02:55:50.738473 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0507 02:55:50.857760 1 request.go:752] "Waited before sending request" delay="1.189116025s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0507 02:55:51.543112 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing E0507 02:55:53.474558 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-tokenrequest-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0507 02:55:53.858193 1 request.go:752] "Waited before sending request" delay="1.16911158s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0507 02:55:54.858406 1 request.go:752] "Waited before sending request" delay="1.183622393s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" I0507 02:55:57.731295 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0507 02:55:59.005801 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"603b46ef-5d6e-409b-aec6-3452d6653443", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0507 02:55:59.857815 1 request.go:752] "Waited before sending request" delay="1.147552423s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0507 02:56:02.858255 1 request.go:752] "Waited before sending request" delay="1.180556163s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0507 02:56:03.858522 1 request.go:752] "Waited before sending request" delay="1.157311215s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0507 02:56:05.057650 1 request.go:752] "Waited before sending request" delay="1.185659953s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-networkpolicy-static-resources--StaticResources&force=true" I0507 02:56:23.276048 1 request.go:752] "Waited before sending request" delay="1.189542493s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" I0507 02:57:37.964535 1 request.go:752] "Waited before sending request" delay="1.110493921s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0507 02:57:38.964597 1 request.go:752] "Waited before sending request" delay="1.384551483s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-controller-deployment-Deployment&force=true" I0507 02:57:40.163826 1 request.go:752] "Waited before sending request" delay="1.177904518s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0507 03:05:39.271035 1 request.go:752] "Waited before sending request" delay="1.183379355s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0507 03:15:39.271991 1 request.go:752] "Waited before sending request" delay="1.18574003s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster"