W0422 10:04:41.124364 1 cmd.go:257] Using insecure, self-signed certificates I0422 10:04:41.124459 1 crypto.go:600] Generating new CA for cert-manager-operator-signer@1776852281 cert, and key in /tmp/serving-cert-4159122095/serving-signer.crt, /tmp/serving-cert-4159122095/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1776852281" is unset, resetting to 43800h0m0s! I0422 10:04:41.255189 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0422 10:04:41.255442 1 observer_polling.go:159] Starting file observer I0422 10:04:41.292453 1 builder.go:304] cert-manager-operator version - I0422 10:04:41.293195 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-4159122095/tls.crt::/tmp/serving-cert-4159122095/tls.key" I0422 10:04:41.523215 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0422 10:04:41.528813 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0422 10:04:41.528827 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0422 10:04:41.528839 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0422 10:04:41.528843 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0422 10:04:41.531421 1 secure_serving.go:57] Forcing use of http/1.1 only I0422 10:04:41.531434 1 genericapiserver.go:552] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete I0422 10:04:41.538847 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0422 10:04:41.538856 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0422 10:04:41.538886 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0422 10:04:41.538885 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0422 10:04:41.538909 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0422 10:04:41.538885 1 shared_informer.go:349] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0422 10:04:41.539084 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-4159122095/tls.crt::/tmp/serving-cert-4159122095/tls.key" I0422 10:04:41.539200 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-4159122095/tls.crt::/tmp/serving-cert-4159122095/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1776852281\" (2026-04-22 10:04:40 +0000 UTC to 2026-04-22 10:04:41 +0000 UTC (now=2026-04-22 10:04:41.539159963 +0000 UTC))" I0422 10:04:41.539467 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776852281\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776852281\" (2026-04-22 09:04:41 +0000 UTC to 2029-04-22 09:04:41 +0000 UTC (now=2026-04-22 10:04:41.539446158 +0000 UTC))" I0422 10:04:41.539487 1 secure_serving.go:211] Serving securely on [::]:8443 I0422 10:04:41.539502 1 genericapiserver.go:702] [graceful-termination] waiting for shutdown to be initiated I0422 10:04:41.539512 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0422 10:04:41.539654 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0422 10:04:41.543288 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0422 10:04:41.543770 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0422 10:04:41.544087 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0422 10:04:41.551602 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0422 10:04:41.551721 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"55daff32-83c1-4b4c-8e75-0b8e22fffb65", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"27801", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-665bb775dc-q77qq_ab90645e-a0b3-4cdc-8a6c-f3398cd19795 became leader I0422 10:04:41.562927 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0422 10:04:41.562999 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0422 10:04:41.563030 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0422 10:04:41.563064 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0422 10:04:41.563084 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0422 10:04:41.563089 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0422 10:04:41.563097 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0422 10:04:41.563104 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0422 10:04:41.563138 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0422 10:04:41.565571 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.565875 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.567171 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.569465 1 reflector.go:439] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.572703 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.572738 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.572811 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.572830 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.572980 1 reflector.go:439] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0422 10:04:41.573018 1 reflector.go:439] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0422 10:04:41.573314 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.573746 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.573747 1 reflector.go:439] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.579902 1 features.go:133] "cluster featureset: spec.featureSet not in allowed list" logger="features" featureSet="" I0422 10:04:41.579916 1 features.go:195] "cluster feature gate: preview featureset not enabled" logger="features" feature="TrustManager" I0422 10:04:41.579922 1 setup_manager.go:121] "setting up unified operator manager" logger="setup-manager" I0422 10:04:41.579927 1 setup_manager.go:122] "controller" logger="setup-manager" version="" I0422 10:04:41.579933 1 setup_manager.go:123] "enabled controllers" logger="setup-manager" istioCSR=true trustManager=false I0422 10:04:41.580514 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.588566 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0422 10:04:41.594763 1 setup_manager.go:156] "setting up controller" logger="setup-manager" name="cert-manager-istio-csr-controller" I0422 10:04:41.594859 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0422 10:04:41.594982 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0422 10:04:41.595131 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterIssuer" I0422 10:04:41.595163 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0422 10:04:41.595186 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0422 10:04:41.595203 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0422 10:04:41.595210 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0422 10:04:41.595202 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0422 10:04:41.595228 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0422 10:04:41.595232 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0422 10:04:41.595234 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0422 10:04:41.595241 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0422 10:04:41.595275 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Issuer" I0422 10:04:41.595357 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0422 10:04:41.595256 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0422 10:04:41.595381 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0422 10:04:41.598603 1 reflector.go:439] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.598909 1 reflector.go:439] "Caches populated" type="*v1.ClusterIssuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.603231 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.603370 1 reflector.go:439] "Caches populated" type="*v1.Issuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.603442 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.603600 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.603616 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.603731 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.603845 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.603951 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.604099 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.604121 1 reflector.go:439] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.620430 1 reflector.go:439] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.639036 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0422 10:04:41.639046 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0422 10:04:41.639101 1 shared_informer.go:356] "Caches are synced" controller="RequestHeaderAuthRequestController" I0422 10:04:41.639542 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-04-22 09:36:32 +0000 UTC to 2036-04-19 09:36:32 +0000 UTC (now=2026-04-22 10:04:41.639244048 +0000 UTC))" I0422 10:04:41.639895 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-4159122095/tls.crt::/tmp/serving-cert-4159122095/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1776852281\" (2026-04-22 10:04:40 +0000 UTC to 2026-04-22 10:04:41 +0000 UTC (now=2026-04-22 10:04:41.639873815 +0000 UTC))" I0422 10:04:41.640186 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776852281\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776852281\" (2026-04-22 09:04:41 +0000 UTC to 2029-04-22 09:04:41 +0000 UTC (now=2026-04-22 10:04:41.640163544 +0000 UTC))" I0422 10:04:41.640550 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-04-22 09:36:33 +0000 UTC to 2036-04-19 09:36:33 +0000 UTC (now=2026-04-22 10:04:41.640530577 +0000 UTC))" I0422 10:04:41.640600 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-04-22 09:36:34 +0000 UTC to 2036-04-19 09:36:34 +0000 UTC (now=2026-04-22 10:04:41.640579257 +0000 UTC))" I0422 10:04:41.640633 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-04-22 09:36:34 +0000 UTC to 2036-04-19 09:36:34 +0000 UTC (now=2026-04-22 10:04:41.640620644 +0000 UTC))" I0422 10:04:41.640664 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-04-22 09:36:35 +0000 UTC to 2036-04-19 09:36:35 +0000 UTC (now=2026-04-22 10:04:41.640652162 +0000 UTC))" I0422 10:04:41.640710 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-04-22 09:36:35 +0000 UTC to 2036-04-19 09:36:35 +0000 UTC (now=2026-04-22 10:04:41.64068619 +0000 UTC))" I0422 10:04:41.640744 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2pr4em7evgch8g57ha964lrhnj3nimk0-kx-399e68ba43_customer-system-admin-signer@1776850604\" [] issuer=\"\" (2026-04-22 09:36:43 +0000 UTC to 2026-04-29 09:36:44 +0000 UTC (now=2026-04-22 10:04:41.640728326 +0000 UTC))" I0422 10:04:41.640780 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2pr4em7evgch8g57ha964lrhnj3nimk0-kx-399e68ba43_sre-system-admin-signer@1776850604\" [] issuer=\"\" (2026-04-22 09:36:43 +0000 UTC to 2026-04-29 09:36:44 +0000 UTC (now=2026-04-22 10:04:41.640761759 +0000 UTC))" I0422 10:04:41.640817 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-04-22 09:36:32 +0000 UTC to 2036-04-19 09:36:32 +0000 UTC (now=2026-04-22 10:04:41.640804427 +0000 UTC))" I0422 10:04:41.641104 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-4159122095/tls.crt::/tmp/serving-cert-4159122095/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1776852281\" (2026-04-22 10:04:40 +0000 UTC to 2026-04-22 10:04:41 +0000 UTC (now=2026-04-22 10:04:41.641088715 +0000 UTC))" I0422 10:04:41.641487 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776852281\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776852281\" (2026-04-22 09:04:41 +0000 UTC to 2029-04-22 09:04:41 +0000 UTC (now=2026-04-22 10:04:41.641467599 +0000 UTC))" I0422 10:04:41.663314 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment I0422 10:04:41.663326 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0422 10:04:41.663332 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... I0422 10:04:41.663338 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... I0422 10:04:41.663337 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0422 10:04:41.663349 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... I0422 10:04:41.663354 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0422 10:04:41.663362 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0422 10:04:41.663372 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0422 10:04:41.663370 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... I0422 10:04:41.663416 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0422 10:04:41.663428 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... I0422 10:04:41.663423 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0422 10:04:41.663436 1 base_controller.go:82] Caches are synced for DefaultCertManager I0422 10:04:41.663418 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources I0422 10:04:41.663447 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0422 10:04:41.663449 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... E0422 10:04:41.663458 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0422 10:04:41.663439 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... E0422 10:04:41.663466 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0422 10:04:41.663493 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0422 10:04:41.663514 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0422 10:04:41.663633 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager E0422 10:04:41.669062 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0422 10:04:41.670023 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0422 10:04:41.670028 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0422 10:04:41.670034 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0422 10:04:41.699099 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0422 10:04:41.699231 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceCreated' Created Namespace/cert-manager because it was missing I0422 10:04:41.740102 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0422 10:04:41.826083 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0422 10:04:41.841474 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0422 10:04:41.866082 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0422 10:04:41.898622 1 controller.go:286] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0422 10:04:41.898649 1 controller.go:289] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0422 10:04:41.967297 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0422 10:04:42.002709 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0422 10:04:42.859832 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0422 10:04:43.015007 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing I0422 10:04:43.026706 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0422 10:04:43.249207 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0422 10:04:43.274410 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0422 10:04:43.968092 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0422 10:04:44.240698 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0422 10:04:44.433897 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0422 10:04:44.438454 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0422 10:04:45.229517 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0422 10:04:45.260461 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0422 10:04:45.299169 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing I0422 10:04:45.437610 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0422 10:04:45.613712 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0422 10:04:45.633595 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing I0422 10:04:46.045489 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0422 10:04:46.451521 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0422 10:04:46.763824 1 request.go:752] "Waited before sending request" delay="1.13019983s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0422 10:04:46.862851 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing E0422 10:04:47.512754 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0422 10:04:47.963546 1 request.go:752] "Waited before sending request" delay="1.18578155s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" I0422 10:04:48.001988 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing E0422 10:04:48.009165 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0422 10:04:48.166442 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0422 10:04:48.817697 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0422 10:04:49.011435 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0422 10:04:49.697540 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0422 10:04:50.761676 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0422 10:04:51.363907 1 request.go:752] "Waited before sending request" delay="1.095417536s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0422 10:04:51.427585 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0422 10:04:52.002980 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0422 10:04:52.387114 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0422 10:04:52.393440 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0422 10:04:52.399031 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0422 10:04:52.404855 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0422 10:04:52.413082 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0422 10:04:52.763485 1 request.go:752] "Waited before sending request" delay="1.177074025s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0422 10:04:53.168194 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0422 10:04:54.005537 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0422 10:04:54.021085 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0422 10:04:54.076444 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0422 10:04:54.772678 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0422 10:04:55.598419 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0422 10:04:56.008556 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0422 10:04:56.801573 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0422 10:04:57.636239 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0422 10:04:58.417087 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0422 10:04:59.199731 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0422 10:05:00.363402 1 request.go:752] "Waited before sending request" delay="1.163638768s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0422 10:05:01.364110 1 request.go:752] "Waited before sending request" delay="1.392419438s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" E0422 10:05:01.777426 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-tokenrequest-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0422 10:05:02.563189 1 request.go:752] "Waited before sending request" delay="1.192947275s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" I0422 10:05:03.563470 1 request.go:752] "Waited before sending request" delay="1.192737429s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-static-resources--StaticResources&force=true" I0422 10:05:05.408686 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0422 10:05:06.403762 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"57c53b53-1825-4aec-9a8f-a642f3431f4d", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0422 10:05:09.964094 1 request.go:752] "Waited before sending request" delay="1.192916202s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-networkpolicy-static-resources--StaticResources&force=true" I0422 10:05:10.964195 1 request.go:752] "Waited before sending request" delay="1.190557383s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-controller-static-resources--StaticResources&force=true" I0422 10:05:12.163526 1 request.go:752] "Waited before sending request" delay="1.159247478s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster"