W0421 13:29:21.191419 1 cmd.go:257] Using insecure, self-signed certificates I0421 13:29:21.191539 1 crypto.go:600] Generating new CA for cert-manager-operator-signer@1776778161 cert, and key in /tmp/serving-cert-3794732286/serving-signer.crt, /tmp/serving-cert-3794732286/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1776778161" is unset, resetting to 43800h0m0s! I0421 13:29:21.328606 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0421 13:29:21.329476 1 observer_polling.go:159] Starting file observer I0421 13:29:21.356483 1 builder.go:304] cert-manager-operator version - I0421 13:29:21.357093 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3794732286/tls.crt::/tmp/serving-cert-3794732286/tls.key" I0421 13:29:21.529008 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0421 13:29:21.548655 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0421 13:29:21.548673 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0421 13:29:21.548690 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0421 13:29:21.548695 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0421 13:29:21.551540 1 secure_serving.go:57] Forcing use of http/1.1 only I0421 13:29:21.551551 1 genericapiserver.go:552] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete I0421 13:29:21.562960 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0421 13:29:21.563022 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0421 13:29:21.563024 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0421 13:29:21.563047 1 shared_informer.go:349] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0421 13:29:21.563045 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0421 13:29:21.563071 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0421 13:29:21.563350 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3794732286/tls.crt::/tmp/serving-cert-3794732286/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1776778161\" (2026-04-21 13:29:20 +0000 UTC to 2026-04-21 13:29:21 +0000 UTC (now=2026-04-21 13:29:21.563328833 +0000 UTC))" I0421 13:29:21.563351 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3794732286/tls.crt::/tmp/serving-cert-3794732286/tls.key" I0421 13:29:21.563526 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776778161\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776778161\" (2026-04-21 12:29:21 +0000 UTC to 2029-04-21 12:29:21 +0000 UTC (now=2026-04-21 13:29:21.563511548 +0000 UTC))" I0421 13:29:21.563570 1 secure_serving.go:211] Serving securely on [::]:8443 I0421 13:29:21.563594 1 genericapiserver.go:702] [graceful-termination] waiting for shutdown to be initiated I0421 13:29:21.563608 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0421 13:29:21.563957 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0421 13:29:21.572128 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0421 13:29:21.572131 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0421 13:29:21.573304 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0421 13:29:21.587815 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0421 13:29:21.587901 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"4074b509-9ba2-4487-9a40-e5f1c57d8a37", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"26662", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-665bb775dc-mvv4p_b172b365-fe48-41db-8cb3-6f0a6673b3c3 became leader I0421 13:29:21.600074 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0421 13:29:21.600160 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0421 13:29:21.600635 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0421 13:29:21.601182 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0421 13:29:21.601208 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0421 13:29:21.601642 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0421 13:29:21.601740 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0421 13:29:21.603072 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.604136 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0421 13:29:21.604457 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0421 13:29:21.604922 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.604993 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.605142 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.605165 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.605222 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.605245 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.610170 1 reflector.go:439] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.610279 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.610304 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.610547 1 reflector.go:439] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0421 13:29:21.610856 1 reflector.go:439] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0421 13:29:21.612135 1 reflector.go:439] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.616564 1 features.go:133] "cluster featureset: spec.featureSet not in allowed list" logger="features" featureSet="" I0421 13:29:21.616583 1 features.go:195] "cluster feature gate: preview featureset not enabled" logger="features" feature="TrustManager" I0421 13:29:21.616591 1 setup_manager.go:121] "setting up unified operator manager" logger="setup-manager" I0421 13:29:21.616599 1 setup_manager.go:122] "controller" logger="setup-manager" version="" I0421 13:29:21.616608 1 setup_manager.go:123] "enabled controllers" logger="setup-manager" istioCSR=true trustManager=false I0421 13:29:21.618548 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.629559 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0421 13:29:21.637636 1 setup_manager.go:156] "setting up controller" logger="setup-manager" name="cert-manager-istio-csr-controller" I0421 13:29:21.637749 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0421 13:29:21.637856 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0421 13:29:21.637991 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0421 13:29:21.637996 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0421 13:29:21.638009 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterIssuer" I0421 13:29:21.638022 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0421 13:29:21.637998 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0421 13:29:21.638069 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Issuer" I0421 13:29:21.638077 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0421 13:29:21.638153 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0421 13:29:21.638164 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0421 13:29:21.638021 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0421 13:29:21.638043 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0421 13:29:21.638049 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0421 13:29:21.638045 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0421 13:29:21.638795 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0421 13:29:21.641660 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.642690 1 reflector.go:439] "Caches populated" type="*v1.ClusterIssuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.644070 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.650065 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.650084 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.650305 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.650305 1 reflector.go:439] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.651044 1 reflector.go:439] "Caches populated" type="*v1.Issuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.651048 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.652369 1 reflector.go:439] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.658226 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.658254 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.663254 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0421 13:29:21.663266 1 shared_informer.go:356] "Caches are synced" controller="RequestHeaderAuthRequestController" I0421 13:29:21.663541 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0421 13:29:21.663564 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-04-21 12:58:38 +0000 UTC to 2036-04-18 12:58:38 +0000 UTC (now=2026-04-21 13:29:21.663542345 +0000 UTC))" I0421 13:29:21.663582 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-04-21 12:58:39 +0000 UTC to 2036-04-18 12:58:39 +0000 UTC (now=2026-04-21 13:29:21.663575132 +0000 UTC))" I0421 13:29:21.663608 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-04-21 12:58:40 +0000 UTC to 2036-04-18 12:58:40 +0000 UTC (now=2026-04-21 13:29:21.663586614 +0000 UTC))" I0421 13:29:21.663628 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-04-21 12:58:40 +0000 UTC to 2036-04-18 12:58:40 +0000 UTC (now=2026-04-21 13:29:21.663614568 +0000 UTC))" I0421 13:29:21.663648 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-04-21 12:58:41 +0000 UTC to 2036-04-18 12:58:41 +0000 UTC (now=2026-04-21 13:29:21.663639132 +0000 UTC))" I0421 13:29:21.663659 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2pqiajvncvm96ua0fltuleppigk6taqa-kx-25bbd7b25a_customer-system-admin-signer@1776776331\" [] issuer=\"\" (2026-04-21 12:58:50 +0000 UTC to 2026-04-28 12:58:51 +0000 UTC (now=2026-04-21 13:29:21.6636521 +0000 UTC))" I0421 13:29:21.663675 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2pqiajvncvm96ua0fltuleppigk6taqa-kx-25bbd7b25a_sre-system-admin-signer@1776776331\" [] issuer=\"\" (2026-04-21 12:58:50 +0000 UTC to 2026-04-28 12:58:51 +0000 UTC (now=2026-04-21 13:29:21.663666685 +0000 UTC))" I0421 13:29:21.663866 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3794732286/tls.crt::/tmp/serving-cert-3794732286/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1776778161\" (2026-04-21 13:29:20 +0000 UTC to 2026-04-21 13:29:21 +0000 UTC (now=2026-04-21 13:29:21.663857066 +0000 UTC))" I0421 13:29:21.664006 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776778161\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776778161\" (2026-04-21 12:29:21 +0000 UTC to 2029-04-21 12:29:21 +0000 UTC (now=2026-04-21 13:29:21.663997187 +0000 UTC))" I0421 13:29:21.664133 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-04-21 12:58:38 +0000 UTC to 2036-04-18 12:58:38 +0000 UTC (now=2026-04-21 13:29:21.664125648 +0000 UTC))" I0421 13:29:21.664147 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-04-21 12:58:39 +0000 UTC to 2036-04-18 12:58:39 +0000 UTC (now=2026-04-21 13:29:21.664141095 +0000 UTC))" I0421 13:29:21.664158 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-04-21 12:58:40 +0000 UTC to 2036-04-18 12:58:40 +0000 UTC (now=2026-04-21 13:29:21.66415175 +0000 UTC))" I0421 13:29:21.664170 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-04-21 12:58:40 +0000 UTC to 2036-04-18 12:58:40 +0000 UTC (now=2026-04-21 13:29:21.664163779 +0000 UTC))" I0421 13:29:21.664181 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-04-21 12:58:41 +0000 UTC to 2036-04-18 12:58:41 +0000 UTC (now=2026-04-21 13:29:21.664175341 +0000 UTC))" I0421 13:29:21.664192 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2pqiajvncvm96ua0fltuleppigk6taqa-kx-25bbd7b25a_customer-system-admin-signer@1776776331\" [] issuer=\"\" (2026-04-21 12:58:50 +0000 UTC to 2026-04-28 12:58:51 +0000 UTC (now=2026-04-21 13:29:21.664185752 +0000 UTC))" I0421 13:29:21.664202 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2pqiajvncvm96ua0fltuleppigk6taqa-kx-25bbd7b25a_sre-system-admin-signer@1776776331\" [] issuer=\"\" (2026-04-21 12:58:50 +0000 UTC to 2026-04-28 12:58:51 +0000 UTC (now=2026-04-21 13:29:21.664196379 +0000 UTC))" I0421 13:29:21.664214 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-04-21 12:58:38 +0000 UTC to 2036-04-18 12:58:38 +0000 UTC (now=2026-04-21 13:29:21.664207988 +0000 UTC))" I0421 13:29:21.664339 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3794732286/tls.crt::/tmp/serving-cert-3794732286/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1776778161\" (2026-04-21 13:29:20 +0000 UTC to 2026-04-21 13:29:21 +0000 UTC (now=2026-04-21 13:29:21.664331797 +0000 UTC))" I0421 13:29:21.664477 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776778161\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776778161\" (2026-04-21 12:29:21 +0000 UTC to 2029-04-21 12:29:21 +0000 UTC (now=2026-04-21 13:29:21.664470752 +0000 UTC))" I0421 13:29:21.686765 1 reflector.go:439] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.700545 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment I0421 13:29:21.700557 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0421 13:29:21.700565 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... I0421 13:29:21.700569 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... I0421 13:29:21.700719 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0421 13:29:21.700729 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0421 13:29:21.701639 1 base_controller.go:82] Caches are synced for DefaultCertManager I0421 13:29:21.701647 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0421 13:29:21.701654 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0421 13:29:21.701662 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... I0421 13:29:21.701680 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0421 13:29:21.701689 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... I0421 13:29:21.701783 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0421 13:29:21.701796 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... E0421 13:29:21.701804 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0421 13:29:21.701849 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0421 13:29:21.701924 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager I0421 13:29:21.704767 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources I0421 13:29:21.704788 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... I0421 13:29:21.704799 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0421 13:29:21.704813 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... E0421 13:29:21.704893 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0421 13:29:21.705061 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0421 13:29:21.707703 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0421 13:29:21.708825 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0421 13:29:21.710810 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0421 13:29:21.712095 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0421 13:29:21.718615 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0421 13:29:21.719626 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0421 13:29:21.742247 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceCreated' Created Namespace/cert-manager because it was missing I0421 13:29:21.742375 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0421 13:29:21.818551 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0421 13:29:21.873217 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0421 13:29:21.941622 1 controller.go:286] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0421 13:29:21.941647 1 controller.go:289] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0421 13:29:22.054998 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0421 13:29:22.113997 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0421 13:29:22.124221 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0421 13:29:22.177357 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0421 13:29:22.847133 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0421 13:29:22.864939 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0421 13:29:23.047322 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing I0421 13:29:23.064007 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0421 13:29:23.380073 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0421 13:29:24.213147 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0421 13:29:24.274062 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0421 13:29:24.726147 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0421 13:29:25.129157 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0421 13:29:25.142344 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0421 13:29:25.205052 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing E0421 13:29:25.231438 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-deployment reconciliation failed: Operation cannot be fulfilled on certmanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again" I0421 13:29:25.500157 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0421 13:29:25.543988 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing I0421 13:29:25.768922 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0421 13:29:26.153811 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0421 13:29:26.447156 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0421 13:29:26.602761 1 request.go:752] "Waited before sending request" delay="1.058680326s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0421 13:29:26.879761 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing E0421 13:29:27.227495 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0421 13:29:27.256148 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0421 13:29:27.801864 1 request.go:752] "Waited before sending request" delay="1.187220886s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" E0421 13:29:27.819133 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0421 13:29:28.068880 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0421 13:29:28.867696 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0421 13:29:29.090348 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0421 13:29:29.263895 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0421 13:29:29.440053 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0421 13:29:30.242239 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0421 13:29:30.845271 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0421 13:29:31.267919 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0421 13:29:31.602481 1 request.go:752] "Waited before sending request" delay="1.192859134s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0421 13:29:32.112042 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0421 13:29:32.818465 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0421 13:29:33.671075 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0421 13:29:33.685131 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0421 13:29:33.716516 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0421 13:29:34.408543 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0421 13:29:34.851420 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0421 13:29:35.402328 1 request.go:752] "Waited before sending request" delay="1.168092255s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0421 13:29:35.653042 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0421 13:29:36.232261 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0421 13:29:36.240346 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0421 13:29:36.245901 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0421 13:29:36.252984 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0421 13:29:36.483604 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0421 13:29:37.244515 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0421 13:29:38.295321 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0421 13:29:38.894692 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0421 13:29:39.001883 1 request.go:752] "Waited before sending request" delay="1.099335546s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0421 13:29:40.402027 1 request.go:752] "Waited before sending request" delay="1.169064176s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" E0421 13:29:41.216814 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-tokenrequest-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0421 13:29:41.602022 1 request.go:752] "Waited before sending request" delay="1.392788461s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-deployment-reportDegraded&force=true" I0421 13:29:42.801932 1 request.go:752] "Waited before sending request" delay="1.182058662s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0421 13:29:44.861828 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0421 13:29:45.446510 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4aeb5772-f416-44d4-a8b1-07c6fb6b6014", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0421 13:29:45.801893 1 request.go:752] "Waited before sending request" delay="1.192665237s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0421 13:29:49.402556 1 request.go:752] "Waited before sending request" delay="1.192798671s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0421 13:29:50.802373 1 request.go:752] "Waited before sending request" delay="1.147390414s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster"