W0216 17:59:59.002558 1 cmd.go:257] Using insecure, self-signed certificates I0216 17:59:59.002657 1 crypto.go:594] Generating new CA for cert-manager-operator-signer@1771264799 cert, and key in /tmp/serving-cert-3914684964/serving-signer.crt, /tmp/serving-cert-3914684964/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1771264799" is unset, resetting to 43800h0m0s! I0216 17:59:59.344873 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0216 17:59:59.345148 1 observer_polling.go:159] Starting file observer I0216 17:59:59.374137 1 builder.go:304] cert-manager-operator version - I0216 17:59:59.374952 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3914684964/tls.crt::/tmp/serving-cert-3914684964/tls.key" I0216 17:59:59.611651 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0216 17:59:59.617799 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0216 17:59:59.617821 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0216 17:59:59.617839 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0216 17:59:59.617845 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0216 17:59:59.622057 1 secure_serving.go:57] Forcing use of http/1.1 only W0216 17:59:59.622075 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. I0216 17:59:59.622073 1 genericapiserver.go:546] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete W0216 17:59:59.622079 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. W0216 17:59:59.622094 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. W0216 17:59:59.622098 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. W0216 17:59:59.622101 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. W0216 17:59:59.622106 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. I0216 17:59:59.627800 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0216 17:59:59.628729 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0216 17:59:59.628764 1 shared_informer.go:350] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0216 17:59:59.628814 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0216 17:59:59.628823 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0216 17:59:59.628838 1 shared_informer.go:350] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0216 17:59:59.628845 1 shared_informer.go:350] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0216 17:59:59.628949 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3914684964/tls.crt::/tmp/serving-cert-3914684964/tls.key" I0216 17:59:59.629062 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3914684964/tls.crt::/tmp/serving-cert-3914684964/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1771264799\" (2026-02-16 17:59:58 +0000 UTC to 2026-02-16 17:59:59 +0000 UTC (now=2026-02-16 17:59:59.629038992 +0000 UTC))" I0216 17:59:59.629262 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771264799\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771264799\" (2026-02-16 16:59:59 +0000 UTC to 2029-02-16 16:59:59 +0000 UTC (now=2026-02-16 17:59:59.629247315 +0000 UTC))" I0216 17:59:59.629283 1 secure_serving.go:211] Serving securely on [::]:8443 I0216 17:59:59.629307 1 genericapiserver.go:696] [graceful-termination] waiting for shutdown to be initiated I0216 17:59:59.629305 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0216 17:59:59.631646 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0216 17:59:59.631788 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0216 17:59:59.632529 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0216 17:59:59.643501 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0216 17:59:59.643551 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"876a82f7-2e2d-4701-be0b-1a285127f648", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"25326", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-67fc656569-jqn7l_e5a9a1cb-a2c7-4f08-91ac-3412e1f7e7c8 became leader I0216 17:59:59.656021 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0216 17:59:59.656034 1 setup_manager.go:52] "setting up operator manager" logger="setup-manager" controller="cert-manager-istio-csr-controller" I0216 17:59:59.656057 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0216 17:59:59.656070 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0216 17:59:59.656674 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0216 17:59:59.657052 1 setup_manager.go:53] "controller" logger="setup-manager" version="" I0216 17:59:59.657092 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0216 17:59:59.657371 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0216 17:59:59.657564 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0216 17:59:59.657662 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0216 17:59:59.657732 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0216 17:59:59.659222 1 reflector.go:430] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0216 17:59:59.659863 1 reflector.go:430] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.660796 1 reflector.go:430] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.660797 1 reflector.go:430] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.661001 1 reflector.go:430] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0216 17:59:59.665573 1 reflector.go:430] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.665583 1 reflector.go:430] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.666066 1 reflector.go:430] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.666236 1 reflector.go:430] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.666370 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.666952 1 reflector.go:430] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.668498 1 reflector.go:430] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.674243 1 reflector.go:430] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.675211 1 reflector.go:430] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.682036 1 reflector.go:430] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0216 17:59:59.685750 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0216 17:59:59.685870 1 recorder.go:104] "controller is starting" logger="operator-manager.events" type="Normal" object={"kind":"IstioCSR","apiVersion":"operator.openshift.io/v1alpha1"} reason="ControllerStarted" I0216 17:59:59.685894 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0216 17:59:59.686006 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0216 17:59:59.686041 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0216 17:59:59.686056 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0216 17:59:59.686069 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0216 17:59:59.686083 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0216 17:59:59.686092 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0216 17:59:59.686113 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0216 17:59:59.686123 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0216 17:59:59.686129 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0216 17:59:59.686138 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0216 17:59:59.686151 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0216 17:59:59.686163 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0216 17:59:59.686175 1 controller.go:183] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0216 17:59:59.688827 1 reflector.go:430] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.688998 1 reflector.go:430] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.689565 1 reflector.go:430] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.690490 1 reflector.go:430] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.691071 1 reflector.go:430] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.692455 1 reflector.go:430] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.692577 1 reflector.go:430] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.693010 1 reflector.go:430] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.697994 1 reflector.go:430] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.698042 1 reflector.go:430] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.712377 1 reflector.go:430] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.728831 1 shared_informer.go:357] "Caches are synced" controller="RequestHeaderAuthRequestController" I0216 17:59:59.728858 1 shared_informer.go:357] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0216 17:59:59.728936 1 shared_informer.go:357] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0216 17:59:59.729030 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 17:33:44 +0000 UTC to 2036-02-14 17:33:44 +0000 UTC (now=2026-02-16 17:59:59.729004604 +0000 UTC))" I0216 17:59:59.729222 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3914684964/tls.crt::/tmp/serving-cert-3914684964/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1771264799\" (2026-02-16 17:59:58 +0000 UTC to 2026-02-16 17:59:59 +0000 UTC (now=2026-02-16 17:59:59.729211458 +0000 UTC))" I0216 17:59:59.729362 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771264799\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771264799\" (2026-02-16 16:59:59 +0000 UTC to 2029-02-16 16:59:59 +0000 UTC (now=2026-02-16 17:59:59.729352114 +0000 UTC))" I0216 17:59:59.729505 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-02-16 17:33:45 +0000 UTC to 2036-02-14 17:33:45 +0000 UTC (now=2026-02-16 17:59:59.729492499 +0000 UTC))" I0216 17:59:59.729545 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-02-16 17:33:46 +0000 UTC to 2036-02-14 17:33:46 +0000 UTC (now=2026-02-16 17:59:59.729537295 +0000 UTC))" I0216 17:59:59.729559 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-02-16 17:33:47 +0000 UTC to 2036-02-14 17:33:47 +0000 UTC (now=2026-02-16 17:59:59.729549017 +0000 UTC))" I0216 17:59:59.729579 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-02-16 17:33:48 +0000 UTC to 2036-02-14 17:33:48 +0000 UTC (now=2026-02-16 17:59:59.729567753 +0000 UTC))" I0216 17:59:59.729591 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2oggb83k6n7lheuphr2pah8veule9s2s-kx-648e1170f9_customer-system-admin-signer@1771263239\" [] issuer=\"\" (2026-02-16 17:33:59 +0000 UTC to 2026-02-23 17:34:00 +0000 UTC (now=2026-02-16 17:59:59.7295829 +0000 UTC))" I0216 17:59:59.729617 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2oggb83k6n7lheuphr2pah8veule9s2s-kx-648e1170f9_sre-system-admin-signer@1771263239\" [] issuer=\"\" (2026-02-16 17:33:59 +0000 UTC to 2026-02-23 17:34:00 +0000 UTC (now=2026-02-16 17:59:59.729598855 +0000 UTC))" I0216 17:59:59.729630 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-02-16 17:33:44 +0000 UTC to 2036-02-14 17:33:44 +0000 UTC (now=2026-02-16 17:59:59.729623581 +0000 UTC))" I0216 17:59:59.729758 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3914684964/tls.crt::/tmp/serving-cert-3914684964/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1771264799\" (2026-02-16 17:59:58 +0000 UTC to 2026-02-16 17:59:59 +0000 UTC (now=2026-02-16 17:59:59.729750015 +0000 UTC))" I0216 17:59:59.729881 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1771264799\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1771264799\" (2026-02-16 16:59:59 +0000 UTC to 2029-02-16 16:59:59 +0000 UTC (now=2026-02-16 17:59:59.729873787 +0000 UTC))" I0216 17:59:59.756676 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0216 17:59:59.756692 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment I0216 17:59:59.756713 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... I0216 17:59:59.756710 1 base_controller.go:82] Caches are synced for DefaultCertManager I0216 17:59:59.756725 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0216 17:59:59.756702 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0216 17:59:59.756910 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager I0216 17:59:59.757098 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0216 17:59:59.757110 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... I0216 17:59:59.757143 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0216 17:59:59.757152 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... I0216 17:59:59.757857 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0216 17:59:59.757862 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0216 17:59:59.757869 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... I0216 17:59:59.757870 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... I0216 17:59:59.757881 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0216 17:59:59.757889 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... I0216 17:59:59.757904 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources I0216 17:59:59.757909 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... E0216 17:59:59.757916 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0216 17:59:59.757916 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0216 17:59:59.757943 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0216 17:59:59.757949 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0216 17:59:59.764347 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0216 17:59:59.764355 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0216 17:59:59.764376 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0216 17:59:59.764387 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0216 17:59:59.789056 1 core.go:121] Namespace "cert-manager" changes: {"metadata":{"annotations":{"openshift.io/cluster-monitoring":"true"}}} I0216 17:59:59.803009 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0216 17:59:59.810688 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceUpdated' Updated Namespace/cert-manager because it changed I0216 17:59:59.826606 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0216 17:59:59.881575 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0216 17:59:59.887702 1 controller.go:217] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0216 17:59:59.902798 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing I0216 17:59:59.917530 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0216 17:59:59.950940 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0216 18:00:00.061843 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0216 18:00:00.968669 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0216 18:00:01.084647 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0216 18:00:01.278971 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0216 18:00:01.422688 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0216 18:00:01.500546 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0216 18:00:02.099272 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0216 18:00:02.850842 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0216 18:00:02.871641 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0216 18:00:03.002557 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0216 18:00:03.018959 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0216 18:00:03.044099 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing I0216 18:00:03.520377 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing E0216 18:00:03.673050 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-deployment reconciliation failed: Operation cannot be fulfilled on certmanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again" I0216 18:00:03.735466 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0216 18:00:03.758704 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing I0216 18:00:04.144048 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0216 18:00:04.526208 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0216 18:00:04.698730 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0216 18:00:04.856938 1 request.go:752] "Waited before sending request" delay="1.098205317s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" E0216 18:00:05.088649 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0216 18:00:05.338695 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0216 18:00:05.947323 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0216 18:00:06.056801 1 request.go:752] "Waited before sending request" delay="1.155012437s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" E0216 18:00:06.079309 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0216 18:00:06.163329 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0216 18:00:07.124053 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0216 18:00:07.406273 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0216 18:00:08.755530 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0216 18:00:09.056537 1 request.go:752] "Waited before sending request" delay="1.120244948s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:00:09.336362 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0216 18:00:09.850307 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0216 18:00:10.056606 1 request.go:752] "Waited before sending request" delay="1.128469452s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:00:11.256676 1 request.go:752] "Waited before sending request" delay="1.166722122s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-static-resources--StaticResources&force=true" I0216 18:00:11.278688 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0216 18:00:11.916046 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0216 18:00:12.478341 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0216 18:00:13.012554 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0216 18:00:13.036666 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0216 18:00:13.087718 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0216 18:00:13.256618 1 request.go:752] "Waited before sending request" delay="1.037976601s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:00:13.269853 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cert-manager-tokenrequest -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0216 18:00:14.470939 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0216 18:00:15.390293 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0216 18:00:16.169499 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0216 18:00:16.594166 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0216 18:00:17.508555 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0216 18:00:18.342686 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0216 18:00:19.480791 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0216 18:00:19.487104 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0216 18:00:19.492740 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0216 18:00:19.499294 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0216 18:00:19.856240 1 request.go:752] "Waited before sending request" delay="1.143832789s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" E0216 18:00:20.684389 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-cert-manager-tokenrequest-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0216 18:00:20.856778 1 request.go:752] "Waited before sending request" delay="1.192394007s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-deployment-reportDegraded&force=true" I0216 18:00:22.056575 1 request.go:752] "Waited before sending request" delay="1.155257888s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:00:24.354418 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0216 18:00:25.130852 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"e19d0e65-7b9a-464b-9110-a01bcfd33dfa", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cert-manager-tokenrequest -n cert-manager because it was missing I0216 18:00:29.056897 1 request.go:752] "Waited before sending request" delay="1.189016484s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:00:30.256251 1 request.go:752] "Waited before sending request" delay="1.356600433s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:00:31.256559 1 request.go:752] "Waited before sending request" delay="1.186129836s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:10:01.469013 1 request.go:752] "Waited before sending request" delay="1.154201783s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:20:01.470864 1 request.go:752] "Waited before sending request" delay="1.170004486s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:30:01.670645 1 request.go:752] "Waited before sending request" delay="1.174186609s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:40:01.475970 1 request.go:752] "Waited before sending request" delay="1.160248163s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 18:50:01.671569 1 request.go:752] "Waited before sending request" delay="1.175620626s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0216 19:10:01.470371 1 request.go:752] "Waited before sending request" delay="1.168072984s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster"