W0513 20:50:46.877158 1 cmd.go:257] Using insecure, self-signed certificates I0513 20:50:46.877259 1 crypto.go:600] Generating new CA for cert-manager-operator-signer@1778705446 cert, and key in /tmp/serving-cert-1831545192/serving-signer.crt, /tmp/serving-cert-1831545192/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1778705446" is unset, resetting to 43800h0m0s! I0513 20:50:47.012821 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0513 20:50:47.013068 1 observer_polling.go:159] Starting file observer I0513 20:50:47.041842 1 builder.go:304] cert-manager-operator version - I0513 20:50:47.042378 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-1831545192/tls.crt::/tmp/serving-cert-1831545192/tls.key" I0513 20:50:47.235156 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0513 20:50:47.263228 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0513 20:50:47.263242 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0513 20:50:47.263268 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0513 20:50:47.263271 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0513 20:50:47.265929 1 secure_serving.go:57] Forcing use of http/1.1 only I0513 20:50:47.265939 1 genericapiserver.go:552] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete I0513 20:50:47.296274 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0513 20:50:47.296292 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0513 20:50:47.296314 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0513 20:50:47.296327 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0513 20:50:47.296333 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0513 20:50:47.296326 1 shared_informer.go:349] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0513 20:50:47.296575 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-1831545192/tls.crt::/tmp/serving-cert-1831545192/tls.key" I0513 20:50:47.296582 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1831545192/tls.crt::/tmp/serving-cert-1831545192/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778705446\" (2026-05-13 20:50:46 +0000 UTC to 2026-05-13 20:50:47 +0000 UTC (now=2026-05-13 20:50:47.296565589 +0000 UTC))" I0513 20:50:47.296748 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778705447\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778705447\" (2026-05-13 19:50:47 +0000 UTC to 2029-05-13 19:50:47 +0000 UTC (now=2026-05-13 20:50:47.296727931 +0000 UTC))" I0513 20:50:47.296765 1 secure_serving.go:211] Serving securely on [::]:8443 I0513 20:50:47.296783 1 genericapiserver.go:702] [graceful-termination] waiting for shutdown to be initiated I0513 20:50:47.296792 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0513 20:50:47.297031 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0513 20:50:47.321795 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0513 20:50:47.321801 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0513 20:50:47.321794 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0513 20:50:47.354103 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0513 20:50:47.354138 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"e952b33b-fb65-45a6-9d02-68415b6534b1", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"26993", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-665bb775dc-sql2l_32585ff9-5fdf-4aac-99ee-a139c7c3f17d became leader I0513 20:50:47.390458 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0513 20:50:47.390469 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0513 20:50:47.390462 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0513 20:50:47.391241 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0513 20:50:47.391824 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0513 20:50:47.392222 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0513 20:50:47.392621 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0513 20:50:47.393638 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0513 20:50:47.394779 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0513 20:50:47.396965 1 shared_informer.go:356] "Caches are synced" controller="RequestHeaderAuthRequestController" I0513 20:50:47.397040 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0513 20:50:47.397043 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0513 20:50:47.397183 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-13 20:16:03 +0000 UTC to 2036-05-10 20:16:03 +0000 UTC (now=2026-05-13 20:50:47.397164875 +0000 UTC))" I0513 20:50:47.397340 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1831545192/tls.crt::/tmp/serving-cert-1831545192/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778705446\" (2026-05-13 20:50:46 +0000 UTC to 2026-05-13 20:50:47 +0000 UTC (now=2026-05-13 20:50:47.39733121 +0000 UTC))" I0513 20:50:47.397483 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778705447\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778705447\" (2026-05-13 19:50:47 +0000 UTC to 2029-05-13 19:50:47 +0000 UTC (now=2026-05-13 20:50:47.397472775 +0000 UTC))" I0513 20:50:47.397587 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-05-13 20:16:03 +0000 UTC to 2036-05-10 20:16:03 +0000 UTC (now=2026-05-13 20:50:47.397579753 +0000 UTC))" I0513 20:50:47.397600 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-05-13 20:16:05 +0000 UTC to 2036-05-10 20:16:05 +0000 UTC (now=2026-05-13 20:50:47.397594491 +0000 UTC))" I0513 20:50:47.397612 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-05-13 20:16:06 +0000 UTC to 2036-05-10 20:16:06 +0000 UTC (now=2026-05-13 20:50:47.397606134 +0000 UTC))" I0513 20:50:47.397624 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-05-13 20:16:06 +0000 UTC to 2036-05-10 20:16:06 +0000 UTC (now=2026-05-13 20:50:47.397618638 +0000 UTC))" I0513 20:50:47.397635 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-05-13 20:16:06 +0000 UTC to 2036-05-10 20:16:06 +0000 UTC (now=2026-05-13 20:50:47.397629647 +0000 UTC))" I0513 20:50:47.397644 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2q98pbl472eeg1rgrgs7emrkhcrlkcat-kx-abbd2c5d08_customer-system-admin-signer@1778703376\" [] issuer=\"\" (2026-05-13 20:16:16 +0000 UTC to 2026-05-20 20:16:17 +0000 UTC (now=2026-05-13 20:50:47.397638427 +0000 UTC))" I0513 20:50:47.397659 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2q98pbl472eeg1rgrgs7emrkhcrlkcat-kx-abbd2c5d08_sre-system-admin-signer@1778703376\" [] issuer=\"\" (2026-05-13 20:16:15 +0000 UTC to 2026-05-20 20:16:16 +0000 UTC (now=2026-05-13 20:50:47.397650515 +0000 UTC))" I0513 20:50:47.397670 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-13 20:16:03 +0000 UTC to 2036-05-10 20:16:03 +0000 UTC (now=2026-05-13 20:50:47.397665189 +0000 UTC))" I0513 20:50:47.397792 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-1831545192/tls.crt::/tmp/serving-cert-1831545192/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778705446\" (2026-05-13 20:50:46 +0000 UTC to 2026-05-13 20:50:47 +0000 UTC (now=2026-05-13 20:50:47.397784776 +0000 UTC))" I0513 20:50:47.397913 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778705447\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778705447\" (2026-05-13 19:50:47 +0000 UTC to 2029-05-13 19:50:47 +0000 UTC (now=2026-05-13 20:50:47.397906067 +0000 UTC))" I0513 20:50:47.416235 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.416318 1 reflector.go:439] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0513 20:50:47.416465 1 reflector.go:439] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0513 20:50:47.469486 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.469556 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.469573 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.469643 1 reflector.go:439] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.469646 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.469963 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.470001 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.470927 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.471020 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.477346 1 reflector.go:439] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.488837 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.491178 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment I0513 20:50:47.491185 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0513 20:50:47.491193 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... I0513 20:50:47.491188 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... I0513 20:50:47.491197 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0513 20:50:47.491210 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... I0513 20:50:47.493370 1 base_controller.go:82] Caches are synced for DefaultCertManager I0513 20:50:47.493378 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0513 20:50:47.493524 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0513 20:50:47.493519 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager I0513 20:50:47.493531 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0513 20:50:47.493728 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0513 20:50:47.493740 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... E0513 20:50:47.493807 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0513 20:50:47.498996 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0513 20:50:47.509079 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0513 20:50:47.511022 1 features.go:133] "cluster featureset: spec.featureSet not in allowed list" logger="features" featureSet="" I0513 20:50:47.511113 1 features.go:195] "cluster feature gate: preview featureset not enabled" logger="features" feature="TrustManager" I0513 20:50:47.511139 1 setup_manager.go:121] "setting up unified operator manager" logger="setup-manager" I0513 20:50:47.511159 1 setup_manager.go:122] "controller" logger="setup-manager" version="" I0513 20:50:47.511180 1 setup_manager.go:123] "enabled controllers" logger="setup-manager" istioCSR=true trustManager=false E0513 20:50:47.530071 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0513 20:50:47.535901 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0513 20:50:47.580033 1 setup_manager.go:156] "setting up controller" logger="setup-manager" name="cert-manager-istio-csr-controller" I0513 20:50:47.580139 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0513 20:50:47.580253 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0513 20:50:47.580367 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterIssuer" I0513 20:50:47.580385 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0513 20:50:47.580391 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0513 20:50:47.580407 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0513 20:50:47.580386 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0513 20:50:47.580423 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0513 20:50:47.580441 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0513 20:50:47.580428 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0513 20:50:47.580421 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0513 20:50:47.580469 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0513 20:50:47.580472 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Issuer" I0513 20:50:47.580488 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0513 20:50:47.580495 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0513 20:50:47.580526 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0513 20:50:47.592421 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0513 20:50:47.592435 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... I0513 20:50:47.592760 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0513 20:50:47.592773 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... I0513 20:50:47.595074 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources I0513 20:50:47.595101 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... I0513 20:50:47.618194 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.618234 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.618255 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.618280 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.618487 1 reflector.go:439] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.618652 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.618674 1 reflector.go:439] "Caches populated" type="*v1.ClusterIssuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.618922 1 reflector.go:439] "Caches populated" type="*v1.Issuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.660085 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.660085 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.660153 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.660347 1 reflector.go:439] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.707224 1 reflector.go:439] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:47.713249 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceCreated' Created Namespace/cert-manager because it was missing I0513 20:50:47.728866 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0513 20:50:47.864258 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0513 20:50:47.993388 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0513 20:50:47.993878 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0513 20:50:48.037284 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0513 20:50:48.084602 1 controller.go:286] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0513 20:50:48.084620 1 controller.go:289] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0513 20:50:48.238378 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0513 20:50:48.318135 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0513 20:50:48.396857 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0513 20:50:48.491214 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0513 20:50:48.512071 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0513 20:50:48.887943 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0513 20:50:49.257735 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0513 20:50:49.640240 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0513 20:50:49.996695 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0513 20:50:50.633217 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0513 20:50:50.911930 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0513 20:50:50.992206 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing E0513 20:50:51.055545 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-deployment reconciliation failed: Operation cannot be fulfilled on certmanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again" I0513 20:50:51.139387 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0513 20:50:51.167079 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0513 20:50:51.229739 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing I0513 20:50:51.470286 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0513 20:50:51.851932 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0513 20:50:52.026783 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing I0513 20:50:52.237372 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0513 20:50:52.390843 1 request.go:752] "Waited before sending request" delay="1.160618139s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-networkpolicy-static-resources--StaticResources&force=true" I0513 20:50:52.639834 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing E0513 20:50:53.006928 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0513 20:50:53.055118 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0513 20:50:53.391424 1 request.go:752] "Waited before sending request" delay="1.195207313s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-static-resources--StaticResources&force=true" E0513 20:50:53.427624 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0513 20:50:53.963924 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0513 20:50:54.192385 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0513 20:50:55.233202 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0513 20:50:55.453847 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0513 20:50:56.265843 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0513 20:50:56.647970 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0513 20:50:57.031486 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0513 20:50:57.191009 1 request.go:752] "Waited before sending request" delay="1.116589546s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 20:50:57.441366 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0513 20:50:57.795768 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0513 20:50:58.191238 1 request.go:752] "Waited before sending request" delay="1.194391883s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-static-resources--StaticResources&force=true" I0513 20:50:58.434944 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0513 20:50:58.443660 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0513 20:50:58.465421 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0513 20:50:59.596909 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0513 20:51:00.695340 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0513 20:51:01.044373 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0513 20:51:01.435081 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0513 20:51:01.837589 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0513 20:51:02.635325 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0513 20:51:03.887402 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0513 20:51:04.990842 1 request.go:752] "Waited before sending request" delay="1.103430712s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 20:51:06.190542 1 request.go:752] "Waited before sending request" delay="1.373010932s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" E0513 20:51:06.407862 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-tokenrequest-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0513 20:51:07.191440 1 request.go:752] "Waited before sending request" delay="1.376936752s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 20:51:09.447104 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0513 20:51:10.442486 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0513 20:51:13.990937 1 request.go:752] "Waited before sending request" delay="1.191924157s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-deployment-reportDegraded&force=true" I0513 20:51:14.991237 1 request.go:752] "Waited before sending request" delay="1.190743462s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-controller-static-resources--StaticResources&force=true" I0513 20:51:16.190979 1 request.go:752] "Waited before sending request" delay="1.146453376s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 20:51:19.415392 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0513 20:51:19.420749 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0513 20:51:19.425242 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0513 20:51:19.430813 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"7738e9e5-0ac1-4132-899a-9a92a7c7ac26", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0513 20:51:48.550615 1 request.go:752] "Waited before sending request" delay="1.019930512s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 20:51:49.750755 1 request.go:752] "Waited before sending request" delay="1.347293405s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 20:51:50.950386 1 request.go:752] "Waited before sending request" delay="1.386366924s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-deployment-Deployment&force=true" I0513 20:52:48.729312 1 request.go:752] "Waited before sending request" delay="1.00614675s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 21:00:49.422820 1 request.go:752] "Waited before sending request" delay="1.19467084s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-static-resources--StaticResources&force=true" I0513 21:20:49.426181 1 request.go:752] "Waited before sending request" delay="1.175956161s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 21:30:49.425074 1 request.go:752] "Waited before sending request" delay="1.157291825s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 21:40:49.225724 1 request.go:752] "Waited before sending request" delay="1.18346942s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 22:00:49.426539 1 request.go:752] "Waited before sending request" delay="1.182887282s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0513 22:30:49.429687 1 request.go:752] "Waited before sending request" delay="1.181046481s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster"