W0310 19:41:28.131847 1 cmd.go:257] Using insecure, self-signed certificates I0310 19:41:28.131969 1 crypto.go:594] Generating new CA for cert-manager-operator-signer@1773171688 cert, and key in /tmp/serving-cert-2368178556/serving-signer.crt, /tmp/serving-cert-2368178556/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1773171688" is unset, resetting to 43800h0m0s! I0310 19:41:28.504182 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0310 19:41:28.504525 1 observer_polling.go:159] Starting file observer I0310 19:41:28.533575 1 builder.go:304] cert-manager-operator version - I0310 19:41:28.534224 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-2368178556/tls.crt::/tmp/serving-cert-2368178556/tls.key" I0310 19:41:28.911700 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0310 19:41:28.920989 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0310 19:41:28.921006 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0310 19:41:28.921027 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0310 19:41:28.921034 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0310 19:41:28.924436 1 secure_serving.go:57] Forcing use of http/1.1 only W0310 19:41:28.924452 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256' detected. I0310 19:41:28.924451 1 genericapiserver.go:546] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete W0310 19:41:28.924458 1 secure_serving.go:69] Use of insecure cipher 'TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256' detected. W0310 19:41:28.924473 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_GCM_SHA256' detected. W0310 19:41:28.924479 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_GCM_SHA384' detected. W0310 19:41:28.924486 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_128_CBC_SHA' detected. W0310 19:41:28.924490 1 secure_serving.go:69] Use of insecure cipher 'TLS_RSA_WITH_AES_256_CBC_SHA' detected. I0310 19:41:28.931803 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0310 19:41:28.931817 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0310 19:41:28.931836 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0310 19:41:28.931863 1 shared_informer.go:350] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0310 19:41:28.931865 1 shared_informer.go:350] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0310 19:41:28.931865 1 shared_informer.go:350] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0310 19:41:28.932161 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-2368178556/tls.crt::/tmp/serving-cert-2368178556/tls.key" I0310 19:41:28.932352 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2368178556/tls.crt::/tmp/serving-cert-2368178556/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1773171688\" (2026-03-10 19:41:27 +0000 UTC to 2026-03-10 19:41:28 +0000 UTC (now=2026-03-10 19:41:28.932328142 +0000 UTC))" I0310 19:41:28.932582 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773171688\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773171688\" (2026-03-10 18:41:28 +0000 UTC to 2029-03-10 18:41:28 +0000 UTC (now=2026-03-10 19:41:28.932563211 +0000 UTC))" I0310 19:41:28.932607 1 secure_serving.go:211] Serving securely on [::]:8443 I0310 19:41:28.932630 1 genericapiserver.go:696] [graceful-termination] waiting for shutdown to be initiated I0310 19:41:28.932637 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0310 19:41:28.933336 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0310 19:41:28.935367 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0310 19:41:28.936305 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0310 19:41:28.936956 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0310 19:41:28.952047 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0310 19:41:28.952128 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"5e1e5f80-a185-4e00-b6e5-7ddf2b003589", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"18144", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-74c77db8bb-tww5n_f7f49bd5-314d-4b76-8d5f-39302f1b1eb5 became leader I0310 19:41:28.965033 1 setup_manager.go:52] "setting up operator manager" logger="setup-manager" controller="cert-manager-istio-csr-controller" I0310 19:41:28.965102 1 setup_manager.go:53] "controller" logger="setup-manager" version="" I0310 19:41:28.965511 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0310 19:41:28.965638 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0310 19:41:28.965665 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0310 19:41:28.965669 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0310 19:41:28.965675 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0310 19:41:28.965698 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0310 19:41:28.965707 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0310 19:41:28.965991 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0310 19:41:28.966055 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0310 19:41:28.968552 1 reflector.go:430] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0310 19:41:28.968813 1 reflector.go:430] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.968959 1 reflector.go:430] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.971458 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.971467 1 reflector.go:430] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.971459 1 reflector.go:430] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.971626 1 reflector.go:430] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0310 19:41:28.971667 1 reflector.go:430] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.971871 1 reflector.go:430] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.971910 1 reflector.go:430] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.971911 1 reflector.go:430] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.972175 1 reflector.go:430] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.972446 1 reflector.go:430] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.975594 1 reflector.go:430] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.984437 1 reflector.go:430] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0310 19:41:28.990135 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0310 19:41:28.990196 1 recorder.go:104] "controller is starting" logger="operator-manager.events" type="Normal" object={"kind":"IstioCSR","apiVersion":"operator.openshift.io/v1alpha1"} reason="ControllerStarted" I0310 19:41:28.990277 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0310 19:41:28.990319 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0310 19:41:28.990350 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0310 19:41:28.990363 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0310 19:41:28.990371 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0310 19:41:28.990378 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0310 19:41:28.990385 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0310 19:41:28.990394 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0310 19:41:28.990402 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0310 19:41:28.990414 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0310 19:41:28.990426 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0310 19:41:28.990438 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0310 19:41:28.990464 1 controller.go:175] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0310 19:41:28.990482 1 controller.go:183] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0310 19:41:28.996674 1 reflector.go:430] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:28.996681 1 reflector.go:430] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:28.996804 1 reflector.go:430] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:28.996814 1 reflector.go:430] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:28.996824 1 reflector.go:430] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:28.996902 1 reflector.go:430] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:28.996946 1 reflector.go:430] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:28.996833 1 reflector.go:430] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:28.996976 1 reflector.go:430] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:28.997191 1 reflector.go:430] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:29.010072 1 reflector.go:430] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:29.031970 1 shared_informer.go:357] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0310 19:41:29.032058 1 shared_informer.go:357] "Caches are synced" controller="RequestHeaderAuthRequestController" I0310 19:41:29.032159 1 shared_informer.go:357] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0310 19:41:29.032348 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-10 19:16:42 +0000 UTC to 2036-03-07 19:16:42 +0000 UTC (now=2026-03-10 19:41:29.0323279 +0000 UTC))" I0310 19:41:29.032373 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-10 19:16:43 +0000 UTC to 2036-03-07 19:16:43 +0000 UTC (now=2026-03-10 19:41:29.032363144 +0000 UTC))" I0310 19:41:29.032390 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-10 19:16:43 +0000 UTC to 2036-03-07 19:16:43 +0000 UTC (now=2026-03-10 19:41:29.032380174 +0000 UTC))" I0310 19:41:29.032405 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-03-10 19:16:44 +0000 UTC to 2036-03-07 19:16:44 +0000 UTC (now=2026-03-10 19:41:29.032396401 +0000 UTC))" I0310 19:41:29.032421 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-03-10 19:16:44 +0000 UTC to 2036-03-07 19:16:44 +0000 UTC (now=2026-03-10 19:41:29.032413578 +0000 UTC))" I0310 19:41:29.032437 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2ov1t6uc9nv2m79j3ja91bl0ks3h5r3s-kx-708bec4461_customer-system-admin-signer@1773170213\" [] issuer=\"\" (2026-03-10 19:16:52 +0000 UTC to 2026-03-17 19:16:53 +0000 UTC (now=2026-03-10 19:41:29.032428053 +0000 UTC))" I0310 19:41:29.032456 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2ov1t6uc9nv2m79j3ja91bl0ks3h5r3s-kx-708bec4461_sre-system-admin-signer@1773170213\" [] issuer=\"\" (2026-03-10 19:16:52 +0000 UTC to 2026-03-17 19:16:53 +0000 UTC (now=2026-03-10 19:41:29.032446883 +0000 UTC))" I0310 19:41:29.032648 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2368178556/tls.crt::/tmp/serving-cert-2368178556/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1773171688\" (2026-03-10 19:41:27 +0000 UTC to 2026-03-10 19:41:28 +0000 UTC (now=2026-03-10 19:41:29.032636966 +0000 UTC))" I0310 19:41:29.032932 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773171688\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773171688\" (2026-03-10 18:41:28 +0000 UTC to 2029-03-10 18:41:28 +0000 UTC (now=2026-03-10 19:41:29.032910124 +0000 UTC))" I0310 19:41:29.033165 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-03-10 19:16:42 +0000 UTC to 2036-03-07 19:16:42 +0000 UTC (now=2026-03-10 19:41:29.033141208 +0000 UTC))" I0310 19:41:29.033197 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-03-10 19:16:43 +0000 UTC to 2036-03-07 19:16:43 +0000 UTC (now=2026-03-10 19:41:29.033181627 +0000 UTC))" I0310 19:41:29.033224 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-03-10 19:16:43 +0000 UTC to 2036-03-07 19:16:43 +0000 UTC (now=2026-03-10 19:41:29.033210096 +0000 UTC))" I0310 19:41:29.033249 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-03-10 19:16:44 +0000 UTC to 2036-03-07 19:16:44 +0000 UTC (now=2026-03-10 19:41:29.033235063 +0000 UTC))" I0310 19:41:29.033274 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-03-10 19:16:44 +0000 UTC to 2036-03-07 19:16:44 +0000 UTC (now=2026-03-10 19:41:29.033259802 +0000 UTC))" I0310 19:41:29.033305 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2ov1t6uc9nv2m79j3ja91bl0ks3h5r3s-kx-708bec4461_customer-system-admin-signer@1773170213\" [] issuer=\"\" (2026-03-10 19:16:52 +0000 UTC to 2026-03-17 19:16:53 +0000 UTC (now=2026-03-10 19:41:29.033287019 +0000 UTC))" I0310 19:41:29.033335 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2ov1t6uc9nv2m79j3ja91bl0ks3h5r3s-kx-708bec4461_sre-system-admin-signer@1773170213\" [] issuer=\"\" (2026-03-10 19:16:52 +0000 UTC to 2026-03-17 19:16:53 +0000 UTC (now=2026-03-10 19:41:29.033318241 +0000 UTC))" I0310 19:41:29.033361 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-03-10 19:16:41 +0000 UTC to 2036-03-07 19:16:41 +0000 UTC (now=2026-03-10 19:41:29.033347795 +0000 UTC))" I0310 19:41:29.033587 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-2368178556/tls.crt::/tmp/serving-cert-2368178556/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1773171688\" (2026-03-10 19:41:27 +0000 UTC to 2026-03-10 19:41:28 +0000 UTC (now=2026-03-10 19:41:29.033569554 +0000 UTC))" I0310 19:41:29.033839 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1773171688\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1773171688\" (2026-03-10 18:41:28 +0000 UTC to 2029-03-10 18:41:28 +0000 UTC (now=2026-03-10 19:41:29.03382288 +0000 UTC))" I0310 19:41:29.065717 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0310 19:41:29.065752 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment I0310 19:41:29.065754 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0310 19:41:29.065764 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... I0310 19:41:29.065769 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0310 19:41:29.065770 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0310 19:41:29.065787 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... I0310 19:41:29.065752 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... I0310 19:41:29.065797 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0310 19:41:29.065808 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... I0310 19:41:29.065728 1 base_controller.go:82] Caches are synced for DefaultCertManager I0310 19:41:29.065818 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0310 19:41:29.065844 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources I0310 19:41:29.065855 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... E0310 19:41:29.065867 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0310 19:41:29.065904 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0310 19:41:29.066027 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager I0310 19:41:29.066139 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0310 19:41:29.066144 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0310 19:41:29.066151 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... I0310 19:41:29.066154 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... E0310 19:41:29.066195 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0310 19:41:29.066206 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0310 19:41:29.072445 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0310 19:41:29.072454 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0310 19:41:29.072473 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0310 19:41:29.072480 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0310 19:41:29.113236 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceCreated' Created Namespace/cert-manager because it was missing I0310 19:41:29.120728 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0310 19:41:29.127672 1 reflector.go:430] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:106" I0310 19:41:29.157317 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0310 19:41:29.187876 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0310 19:41:29.192065 1 controller.go:217] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0310 19:41:29.273982 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0310 19:41:29.361579 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0310 19:41:29.380431 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0310 19:41:30.026604 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0310 19:41:30.378240 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0310 19:41:30.916424 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0310 19:41:30.987506 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0310 19:41:31.076314 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0310 19:41:31.108638 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0310 19:41:32.309583 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0310 19:41:32.388087 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0310 19:41:32.390687 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0310 19:41:32.423293 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0310 19:41:32.456861 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing I0310 19:41:32.649077 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0310 19:41:33.228088 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0310 19:41:33.254333 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing I0310 19:41:33.460585 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing E0310 19:41:33.780482 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-deployment reconciliation failed: Operation cannot be fulfilled on certmanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again" I0310 19:41:33.839959 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0310 19:41:34.249142 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0310 19:41:34.366130 1 request.go:752] "Waited before sending request" delay="1.111857249s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" E0310 19:41:34.580664 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0310 19:41:34.648777 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0310 19:41:35.439766 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0310 19:41:35.566017 1 request.go:752] "Waited before sending request" delay="1.190609043s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" E0310 19:41:35.581847 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0310 19:41:36.060863 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0310 19:41:36.434878 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0310 19:41:36.614572 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing I0310 19:41:36.862478 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0310 19:41:37.441605 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0310 19:41:38.228536 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0310 19:41:38.649658 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0310 19:41:39.165615 1 request.go:752] "Waited before sending request" delay="1.183217551s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0310 19:41:39.440125 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0310 19:41:40.176503 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0310 19:41:40.192859 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJ3VENDQVVlZ0F3SUJBZ0lRUEl2eFV1RmNtR0V6eENzRlFCaFBEREFLQmdncWhrak9QUVFEQXpBaU1TQXcKSGdZRFZRUURFeGRqWlhKMExXMWhibUZuWlhJdGQyVmlhRzl2YXkxallUQWVGdzB5TmpBek1UQXhPVFF4TXpkYQpGdzB5TnpBek1UQXhPVFF4TXpkYU1DSXhJREFlQmdOVkJBTVRGMk5sY25RdGJXRnVZV2RsY2kxM1pXSm9iMjlyCkxXTmhNSFl3RUFZSEtvWkl6ajBDQVFZRks0RUVBQ0lEWWdBRVBrNjRPeUZ3anMyTkNnRCtzT1IzTkhwNS91SHUKR0NoTlJITm5VblZ6aWE4VEtuMEpoWkVSVlROZlFLcC9FWTBWUGFaQlpQcVQwMC9DaEh2VUF4bVVqMDQyYU91UApoRFMyYzRkUi9Ebm5iNWc0QkNtdFh2a1Q1VGJhRmtGLzMzOE1vMEl3UURBT0JnTlZIUThCQWY4RUJBTUNBcVF3CkR3WURWUjBUQVFIL0JBVXdBd0VCL3pBZEJnTlZIUTRFRmdRVUN1WnhsZjdndFlrZjhLS3pkT0MxUk9RK3FEd3cKQ2dZSUtvWkl6ajBFQXdNRGFBQXdaUUl4QU5pbjVHMUFPYkZwTSt3VXVWc21Pc2JkYWFtZWVmV29DV2QzNVF1cwpGWmIxRlF3NGlFRlMzY01XTngxdnc3UHFYd0l3TnJhc3hEQWZXN0h1YThmenQ3ZURyYkpxVER2UjZwL214b1QrCk1pTlB6b3k5QjhUR1I0MFBZenVtNVV3WUEwdXMKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo=","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0310 19:41:40.202521 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0310 19:41:40.214076 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0310 19:41:40.221345 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0310 19:41:40.945412 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0310 19:41:41.011283 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0310 19:41:41.052566 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0310 19:41:41.165435 1 request.go:752] "Waited before sending request" delay="1.17336032s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0310 19:41:41.771651 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cert-manager-tokenrequest -n cert-manager: rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0310 19:41:42.295134 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0310 19:41:42.765380 1 request.go:752] "Waited before sending request" delay="1.184965525s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0310 19:41:43.041729 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0310 19:41:43.847079 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0310 19:41:44.644283 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0310 19:41:44.765900 1 request.go:752] "Waited before sending request" delay="1.180385046s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0310 19:41:45.449202 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0310 19:41:45.841889 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0310 19:41:46.365908 1 request.go:752] "Waited before sending request" delay="1.186166215s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0310 19:41:47.565936 1 request.go:752] "Waited before sending request" delay="1.189185028s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" E0310 19:41:48.384808 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-cert-manager-tokenrequest-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0310 19:41:48.765226 1 request.go:752] "Waited before sending request" delay="1.391252352s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-networkpolicy-static-resources--StaticResources&force=true" I0310 19:41:49.765452 1 request.go:752] "Waited before sending request" delay="1.179242035s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0310 19:41:52.281878 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0310 19:41:53.083503 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"9f67ad24-c106-42f8-9f30-2572ce1d9f9b", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cert-manager-tokenrequest -n cert-manager because it was missing I0310 19:41:56.565285 1 request.go:752] "Waited before sending request" delay="1.170783133s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-controller-deployment-reportDegraded&force=true" I0310 19:41:57.565918 1 request.go:752] "Waited before sending request" delay="1.19164317s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-controller-static-resources--StaticResources&force=true" I0310 19:41:58.765794 1 request.go:752] "Waited before sending request" delay="1.150698009s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0310 19:51:30.579572 1 request.go:752] "Waited before sending request" delay="1.181274199s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0310 20:01:30.980149 1 request.go:752] "Waited before sending request" delay="1.176503899s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0310 20:11:30.982034 1 request.go:752] "Waited before sending request" delay="1.179535803s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster"