W0417 20:06:58.144551 1 cmd.go:257] Using insecure, self-signed certificates I0417 20:06:58.144875 1 crypto.go:594] Generating new CA for cert-manager-operator-signer@1776456418 cert, and key in /tmp/serving-cert-2225940145/serving-signer.crt, /tmp/serving-cert-2225940145/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1776456418" is unset, resetting to 43800h0m0s! I0417 20:06:58.776358 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0417 20:06:58.776600 1 observer_polling.go:159] Starting file observer I0417 20:06:58.798524 1 builder.go:304] cert-manager-operator version - I0417 20:06:58.799044 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-2225940145/tls.crt::/tmp/serving-cert-2225940145/tls.key" I0417 20:06:59.244077 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0417 20:06:59.249633 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0417 20:06:59.249648 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0417 20:06:59.249662 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0417 20:06:59.249666 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0417 20:06:59.252173 1 secure_serving.go:57] Forcing use of http/1.1 only I0417 20:06:59.252183 1 genericapiserver.go:546] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete W0417 20:06:59.252189 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. W0417 20:06:59.252193 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. W0417 20:06:59.252196 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. W0417 20:06:59.252198 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. W0417 20:06:59.252200 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. W0417 20:06:59.252202 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. I0417 20:06:59.257463 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0417 20:06:59.257468 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0417 20:06:59.257491 1 shared_informer.go:350] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0417 20:06:59.257487 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0417 20:06:59.257507 1 shared_informer.go:350] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0417 20:06:59.257490 1 shared_informer.go:350] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0417 20:06:59.257726 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-2225940145/tls.crt::/tmp/serving-cert-2225940145/tls.key" I0417 20:06:59.257768 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2225940145/tls.crt::/tmp/serving-cert-2225940145/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1776456418\" (2026-04-17 20:06:57 +0000 UTC to 2026-04-17 20:06:58 +0000 UTC (now=2026-04-17 20:06:59.257733214 +0000 UTC))" I0417 20:06:59.257915 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776456419\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776456418\" (2026-04-17 19:06:58 +0000 UTC to 2029-04-17 19:06:58 +0000 UTC (now=2026-04-17 20:06:59.257903431 +0000 UTC))" I0417 20:06:59.257932 1 secure_serving.go:211] Serving securely on [::]:8443 I0417 20:06:59.257943 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0417 20:06:59.257947 1 genericapiserver.go:696] [graceful-termination] waiting for shutdown to be initiated I0417 20:06:59.258081 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0417 20:06:59.260604 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0417 20:06:59.261663 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0417 20:06:59.262007 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0417 20:06:59.270075 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0417 20:06:59.270119 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"95c962af-db06-4ec4-bf0c-414e23b64d0e", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"27901", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-c6f765b78-f6m6g_b9acd0aa-82cb-4e5d-8590-c80f8eaf4415 became leader I0417 20:06:59.280101 1 setup_manager.go:52] "setting up operator manager" logger="setup-manager" controller="cert-manager-istio-csr-controller" I0417 20:06:59.280118 1 setup_manager.go:53] "controller" logger="setup-manager" version="" I0417 20:06:59.280122 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0417 20:06:59.280189 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0417 20:06:59.280927 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0417 20:06:59.280945 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0417 20:06:59.281161 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0417 20:06:59.281173 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0417 20:06:59.281253 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0417 20:06:59.281269 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0417 20:06:59.281275 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0417 20:06:59.285002 1 reflector.go:430] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.285181 1 reflector.go:430] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0417 20:06:59.308277 1 reflector.go:430] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.308278 1 reflector.go:430] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.308303 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.308317 1 reflector.go:430] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.308685 1 reflector.go:430] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.309136 1 reflector.go:430] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.309218 1 reflector.go:430] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.309415 1 reflector.go:430] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0417 20:06:59.310276 1 reflector.go:430] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.310821 1 reflector.go:430] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.317144 1 reflector.go:430] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.317953 1 reflector.go:430] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.325809 1 reflector.go:430] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0417 20:06:59.332213 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0417 20:06:59.332303 1 recorder.go:104] "controller is starting" logger="operator-manager.events" type="Normal" object={"kind":"IstioCSR","apiVersion":"operator.openshift.io/v1alpha1"} reason="ControllerStarted" I0417 20:06:59.332358 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0417 20:06:59.332437 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0417 20:06:59.332465 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0417 20:06:59.332476 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0417 20:06:59.332482 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0417 20:06:59.332491 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0417 20:06:59.332496 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0417 20:06:59.332507 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0417 20:06:59.332512 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0417 20:06:59.332521 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0417 20:06:59.332527 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0417 20:06:59.332537 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0417 20:06:59.332550 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0417 20:06:59.332556 1 controller.go:183] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0417 20:06:59.336397 1 reflector.go:430] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.336407 1 reflector.go:430] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.336635 1 reflector.go:430] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.337020 1 reflector.go:430] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.337087 1 reflector.go:430] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.338979 1 reflector.go:430] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.338983 1 reflector.go:430] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.345366 1 reflector.go:430] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.349991 1 reflector.go:430] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.349996 1 reflector.go:430] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.355909 1 reflector.go:430] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.358559 1 shared_informer.go:357] "Caches are synced" controller="RequestHeaderAuthRequestController" I0417 20:06:59.358569 1 shared_informer.go:357] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0417 20:06:59.358581 1 shared_informer.go:357] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0417 20:06:59.358701 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-04-17 19:34:38 +0000 UTC to 2036-04-14 19:34:38 +0000 UTC (now=2026-04-17 20:06:59.358683696 +0000 UTC))" I0417 20:06:59.358873 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2225940145/tls.crt::/tmp/serving-cert-2225940145/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1776456418\" (2026-04-17 20:06:57 +0000 UTC to 2026-04-17 20:06:58 +0000 UTC (now=2026-04-17 20:06:59.358862459 +0000 UTC))" I0417 20:06:59.359039 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776456419\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776456418\" (2026-04-17 19:06:58 +0000 UTC to 2029-04-17 19:06:58 +0000 UTC (now=2026-04-17 20:06:59.359030586 +0000 UTC))" I0417 20:06:59.359147 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-04-17 19:34:38 +0000 UTC to 2036-04-14 19:34:38 +0000 UTC (now=2026-04-17 20:06:59.359138291 +0000 UTC))" I0417 20:06:59.359161 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-04-17 19:34:39 +0000 UTC to 2036-04-14 19:34:39 +0000 UTC (now=2026-04-17 20:06:59.359155148 +0000 UTC))" I0417 20:06:59.359171 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-04-17 19:34:40 +0000 UTC to 2036-04-14 19:34:40 +0000 UTC (now=2026-04-17 20:06:59.359164969 +0000 UTC))" I0417 20:06:59.359181 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-04-17 19:34:41 +0000 UTC to 2036-04-14 19:34:41 +0000 UTC (now=2026-04-17 20:06:59.359175511 +0000 UTC))" I0417 20:06:59.359195 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-04-17 19:34:41 +0000 UTC to 2036-04-14 19:34:41 +0000 UTC (now=2026-04-17 20:06:59.359190081 +0000 UTC))" I0417 20:06:59.359205 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2po3o6gptlnd78a9ahf7q1kupfh53p92-kx-c4b6e97885_customer-system-admin-signer@1776454492\" [] issuer=\"\" (2026-04-17 19:34:52 +0000 UTC to 2026-04-24 19:34:53 +0000 UTC (now=2026-04-17 20:06:59.359199 +0000 UTC))" I0417 20:06:59.359216 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2po3o6gptlnd78a9ahf7q1kupfh53p92-kx-c4b6e97885_sre-system-admin-signer@1776454492\" [] issuer=\"\" (2026-04-17 19:34:51 +0000 UTC to 2026-04-24 19:34:52 +0000 UTC (now=2026-04-17 20:06:59.359209531 +0000 UTC))" I0417 20:06:59.359224 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-04-17 19:34:38 +0000 UTC to 2036-04-14 19:34:38 +0000 UTC (now=2026-04-17 20:06:59.359218949 +0000 UTC))" I0417 20:06:59.359344 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2225940145/tls.crt::/tmp/serving-cert-2225940145/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1776456418\" (2026-04-17 20:06:57 +0000 UTC to 2026-04-17 20:06:58 +0000 UTC (now=2026-04-17 20:06:59.359337442 +0000 UTC))" I0417 20:06:59.359463 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1776456419\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1776456418\" (2026-04-17 19:06:58 +0000 UTC to 2029-04-17 19:06:58 +0000 UTC (now=2026-04-17 20:06:59.359456618 +0000 UTC))" I0417 20:06:59.380183 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment I0417 20:06:59.380196 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... I0417 20:06:59.380227 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0417 20:06:59.380238 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0417 20:06:59.381075 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0417 20:06:59.381088 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... I0417 20:06:59.381286 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0417 20:06:59.381295 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... I0417 20:06:59.381296 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0417 20:06:59.381304 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... I0417 20:06:59.381311 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0417 20:06:59.381318 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... I0417 20:06:59.381332 1 base_controller.go:82] Caches are synced for DefaultCertManager I0417 20:06:59.381340 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0417 20:06:59.381346 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources I0417 20:06:59.381335 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0417 20:06:59.381351 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... E0417 20:06:59.381349 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0417 20:06:59.381353 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... E0417 20:06:59.381351 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0417 20:06:59.381368 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0417 20:06:59.381371 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0417 20:06:59.381478 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager E0417 20:06:59.388620 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0417 20:06:59.388632 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0417 20:06:59.388641 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0417 20:06:59.388646 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0417 20:06:59.400732 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0417 20:06:59.400773 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0417 20:06:59.400789 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0417 20:06:59.400765 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0417 20:06:59.466447 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceCreated' Created Namespace/cert-manager because it was missing I0417 20:06:59.468661 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0417 20:06:59.559431 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0417 20:06:59.641919 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0417 20:06:59.645055 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0417 20:06:59.723304 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0417 20:06:59.734651 1 controller.go:217] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0417 20:06:59.796557 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0417 20:06:59.991979 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0417 20:07:00.404740 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0417 20:07:00.549860 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0417 20:07:00.563442 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing I0417 20:07:00.612871 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0417 20:07:00.783654 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0417 20:07:01.050089 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0417 20:07:01.823541 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0417 20:07:01.904644 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0417 20:07:02.150301 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0417 20:07:02.936747 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0417 20:07:02.969094 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing I0417 20:07:03.184778 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0417 20:07:03.196368 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0417 20:07:03.223065 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing I0417 20:07:03.345387 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0417 20:07:03.726647 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0417 20:07:04.121648 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0417 20:07:04.281801 1 request.go:752] "Waited before sending request" delay="1.058684804s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:07:04.545649 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing E0417 20:07:04.899359 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0417 20:07:04.949965 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0417 20:07:05.482075 1 request.go:752] "Waited before sending request" delay="1.193904162s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-static-resources--StaticResources&force=true" E0417 20:07:05.499919 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0417 20:07:05.550577 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0417 20:07:05.725859 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0417 20:07:06.946024 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0417 20:07:07.734234 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0417 20:07:07.952515 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0417 20:07:08.518562 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0417 20:07:08.997154 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0417 20:07:10.022053 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0417 20:07:10.697562 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0417 20:07:11.536969 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0417 20:07:11.548376 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0417 20:07:11.571355 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0417 20:07:12.093609 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cert-manager-tokenrequest -n cert-manager: roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0417 20:07:12.114718 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJ3VENDQVVlZ0F3SUJBZ0lRVnk2OTgxWGFBNTdUYTFJU2hDWHBrVEFLQmdncWhrak9QUVFEQXpBaU1TQXcKSGdZRFZRUURFeGRqWlhKMExXMWhibUZuWlhJdGQyVmlhRzl2YXkxallUQWVGdzB5TmpBME1UY3lNREEzTURoYQpGdzB5TnpBME1UY3lNREEzTURoYU1DSXhJREFlQmdOVkJBTVRGMk5sY25RdGJXRnVZV2RsY2kxM1pXSm9iMjlyCkxXTmhNSFl3RUFZSEtvWkl6ajBDQVFZRks0RUVBQ0lEWWdBRXBkS2ZZbG56bEh4a3JpaUU2VUZmdkZDaU9DQncKaUI5NVVHZFQrQ2dHSFk3NHJ2OE5Dc0NhTHkrUENaVVdtMWxlK1RUbUsvaXIyTzRjQXNVMWQwRmlwKzhkUlc0Twp0NDFzQmI5NzAvd1FvMWNlbzhOZHg5dHRrRXFZVTd5WU54YXdvMEl3UURBT0JnTlZIUThCQWY4RUJBTUNBcVF3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBZEJnTlZIUTRFRmdRVU9vbVBaWjlkZ0RZNGxEMzRBNHc0SHhPTGw2OHcKQ2dZSUtvWkl6ajBFQXdNRGFBQXdaUUl3ZS9nblU5elNaTGw2VjRISEpSK2FCNG9Nb3l3dkxmdHF3YktmOC81cwo5SC9IRllUL1BuaHNYNW4xRkxBNFNlZHpBakVBNExFOTdtVk5TdGI3L2ttL3FxMVlaNWNSa2VuWVA2QUFxUS84CnBFaFlUTUlydmZCWm1GOXZzdEdlWVVJMStwTm8KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0417 20:07:12.126513 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0417 20:07:12.137117 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0417 20:07:12.149558 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0417 20:07:12.800616 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0417 20:07:12.881293 1 request.go:752] "Waited before sending request" delay="1.133057307s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:07:13.549622 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0417 20:07:14.116877 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0417 20:07:14.881572 1 request.go:752] "Waited before sending request" delay="1.179668627s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:07:14.915128 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0417 20:07:15.715665 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0417 20:07:16.525974 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0417 20:07:16.681759 1 request.go:752] "Waited before sending request" delay="1.175821507s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:07:17.881997 1 request.go:752] "Waited before sending request" delay="1.19293535s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-controller-deployment-Deployment&force=true" E0417 20:07:18.696314 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-cert-manager-tokenrequest-rb.yaml\" (string): roles.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0417 20:07:19.081356 1 request.go:752] "Waited before sending request" delay="1.185200476s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:07:20.081549 1 request.go:752] "Waited before sending request" delay="1.191097654s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-static-resources--StaticResources&force=true" I0417 20:07:22.584217 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0417 20:07:23.721480 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9ff18850-915c-43cb-9dc3-04f644f83b4e", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cert-manager-tokenrequest -n cert-manager because it was missing I0417 20:07:27.881705 1 request.go:752] "Waited before sending request" delay="1.178628508s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:07:28.882105 1 request.go:752] "Waited before sending request" delay="1.192814415s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" I0417 20:07:33.081289 1 request.go:752] "Waited before sending request" delay="1.187840562s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:17:03.114287 1 request.go:752] "Waited before sending request" delay="1.042294637s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:27:01.515278 1 request.go:752] "Waited before sending request" delay="1.005336705s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:37:01.515244 1 request.go:752] "Waited before sending request" delay="1.008157377s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:47:01.122521 1 request.go:752] "Waited before sending request" delay="1.013093562s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0417 20:47:02.122526 1 request.go:752] "Waited before sending request" delay="1.192337637s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-controller-deployment-Deployment&force=true"