W0504 20:42:04.306357 1 cmd.go:257] Using insecure, self-signed certificates I0504 20:42:04.306481 1 crypto.go:600] Generating new CA for cert-manager-operator-signer@1777927324 cert, and key in /tmp/serving-cert-3400315579/serving-signer.crt, /tmp/serving-cert-3400315579/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1777927324" is unset, resetting to 43800h0m0s! I0504 20:42:04.512047 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0504 20:42:04.512299 1 observer_polling.go:159] Starting file observer I0504 20:42:04.587580 1 builder.go:304] cert-manager-operator version - I0504 20:42:04.588213 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3400315579/tls.crt::/tmp/serving-cert-3400315579/tls.key" I0504 20:42:04.717353 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0504 20:42:04.729144 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0504 20:42:04.729163 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0504 20:42:04.729182 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0504 20:42:04.729190 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0504 20:42:04.733319 1 secure_serving.go:57] Forcing use of http/1.1 only I0504 20:42:04.733337 1 genericapiserver.go:552] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete I0504 20:42:04.739728 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0504 20:42:04.739762 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0504 20:42:04.739767 1 shared_informer.go:349] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0504 20:42:04.739776 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0504 20:42:04.739803 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0504 20:42:04.739804 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0504 20:42:04.740254 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3400315579/tls.crt::/tmp/serving-cert-3400315579/tls.key" I0504 20:42:04.740460 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3400315579/tls.crt::/tmp/serving-cert-3400315579/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1777927324\" (2026-05-04 20:42:03 +0000 UTC to 2026-05-04 20:42:04 +0000 UTC (now=2026-05-04 20:42:04.740423781 +0000 UTC))" I0504 20:42:04.740766 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1777927324\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1777927324\" (2026-05-04 19:42:04 +0000 UTC to 2029-05-04 19:42:04 +0000 UTC (now=2026-05-04 20:42:04.74074514 +0000 UTC))" I0504 20:42:04.740795 1 secure_serving.go:211] Serving securely on [::]:8443 I0504 20:42:04.740892 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0504 20:42:04.740898 1 genericapiserver.go:702] [graceful-termination] waiting for shutdown to be initiated I0504 20:42:04.741419 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0504 20:42:04.756830 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0504 20:42:04.757071 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0504 20:42:04.756888 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0504 20:42:04.811008 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0504 20:42:04.811112 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"15140442-f576-474d-957a-aa0af60ddce6", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"17396", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-5b66478c58-kdfh7_f3875f28-57f8-4619-b374-951de8b1c2d1 became leader I0504 20:42:04.840312 1 shared_informer.go:356] "Caches are synced" controller="RequestHeaderAuthRequestController" I0504 20:42:04.840371 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0504 20:42:04.840367 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0504 20:42:04.840553 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-04 20:22:26 +0000 UTC to 2036-05-01 20:22:26 +0000 UTC (now=2026-05-04 20:42:04.840524887 +0000 UTC))" I0504 20:42:04.840858 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3400315579/tls.crt::/tmp/serving-cert-3400315579/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1777927324\" (2026-05-04 20:42:03 +0000 UTC to 2026-05-04 20:42:04 +0000 UTC (now=2026-05-04 20:42:04.840834356 +0000 UTC))" I0504 20:42:04.841097 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1777927324\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1777927324\" (2026-05-04 19:42:04 +0000 UTC to 2029-05-04 19:42:04 +0000 UTC (now=2026-05-04 20:42:04.841077813 +0000 UTC))" I0504 20:42:04.841292 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-05-04 20:22:29 +0000 UTC to 2036-05-01 20:22:29 +0000 UTC (now=2026-05-04 20:42:04.841272033 +0000 UTC))" I0504 20:42:04.841327 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-05-04 20:22:33 +0000 UTC to 2036-05-01 20:22:33 +0000 UTC (now=2026-05-04 20:42:04.841310647 +0000 UTC))" I0504 20:42:04.841372 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-05-04 20:22:35 +0000 UTC to 2036-05-01 20:22:35 +0000 UTC (now=2026-05-04 20:42:04.841343261 +0000 UTC))" I0504 20:42:04.841403 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-05-04 20:22:37 +0000 UTC to 2036-05-01 20:22:37 +0000 UTC (now=2026-05-04 20:42:04.841388216 +0000 UTC))" I0504 20:42:04.841426 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-05-04 20:22:41 +0000 UTC to 2036-05-01 20:22:41 +0000 UTC (now=2026-05-04 20:42:04.841413144 +0000 UTC))" I0504 20:42:04.841498 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2q3b1be7abd6lftrkdcr3bri040ctaq4-kx-6d24bc8bbe_customer-system-admin-signer@1777926273\" [] issuer=\"\" (2026-05-04 20:24:33 +0000 UTC to 2026-05-11 20:24:34 +0000 UTC (now=2026-05-04 20:42:04.841478499 +0000 UTC))" I0504 20:42:04.841556 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2q3b1be7abd6lftrkdcr3bri040ctaq4-kx-6d24bc8bbe_sre-system-admin-signer@1777926273\" [] issuer=\"\" (2026-05-04 20:24:32 +0000 UTC to 2026-05-11 20:24:33 +0000 UTC (now=2026-05-04 20:42:04.841537834 +0000 UTC))" I0504 20:42:04.841602 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-04 20:22:26 +0000 UTC to 2036-05-01 20:22:26 +0000 UTC (now=2026-05-04 20:42:04.841572918 +0000 UTC))" I0504 20:42:04.841904 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3400315579/tls.crt::/tmp/serving-cert-3400315579/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1777927324\" (2026-05-04 20:42:03 +0000 UTC to 2026-05-04 20:42:04 +0000 UTC (now=2026-05-04 20:42:04.841878856 +0000 UTC))" I0504 20:42:04.842200 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1777927324\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1777927324\" (2026-05-04 19:42:04 +0000 UTC to 2029-05-04 19:42:04 +0000 UTC (now=2026-05-04 20:42:04.842182087 +0000 UTC))" I0504 20:42:04.847951 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0504 20:42:04.847986 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0504 20:42:04.850071 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0504 20:42:04.849902 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0504 20:42:04.850359 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0504 20:42:04.850393 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0504 20:42:04.850705 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0504 20:42:04.850753 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0504 20:42:04.851258 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0504 20:42:04.853486 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.853747 1 reflector.go:439] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0504 20:42:04.866174 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.866193 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.866314 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.866335 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.866765 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.869578 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.869638 1 reflector.go:439] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.869821 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.870122 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.872413 1 reflector.go:439] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.873474 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.878517 1 features.go:133] "cluster featureset: spec.featureSet not in allowed list" logger="features" featureSet="" I0504 20:42:04.878535 1 features.go:195] "cluster feature gate: preview featureset not enabled" logger="features" feature="TrustManager" I0504 20:42:04.878543 1 setup_manager.go:121] "setting up unified operator manager" logger="setup-manager" I0504 20:42:04.878550 1 setup_manager.go:122] "controller" logger="setup-manager" version="" I0504 20:42:04.878558 1 setup_manager.go:123] "enabled controllers" logger="setup-manager" istioCSR=true trustManager=false I0504 20:42:04.882537 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0504 20:42:04.911783 1 reflector.go:439] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0504 20:42:04.913271 1 setup_manager.go:156] "setting up controller" logger="setup-manager" name="cert-manager-istio-csr-controller" I0504 20:42:04.913417 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0504 20:42:04.913566 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0504 20:42:04.913780 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0504 20:42:04.913787 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0504 20:42:04.913797 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterIssuer" I0504 20:42:04.913823 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0504 20:42:04.913822 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0504 20:42:04.913830 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0504 20:42:04.913833 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0504 20:42:04.913793 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0504 20:42:04.913858 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0504 20:42:04.913877 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Issuer" I0504 20:42:04.913908 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0504 20:42:04.913954 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0504 20:42:04.913987 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0504 20:42:04.913881 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0504 20:42:04.922164 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:04.922211 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:04.928243 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:04.928256 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:04.928268 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:04.938339 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:04.940916 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:04.947092 1 reflector.go:439] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:04.948526 1 base_controller.go:82] Caches are synced for DefaultCertManager I0504 20:42:04.948550 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0504 20:42:04.948537 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0504 20:42:04.948572 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... I0504 20:42:04.948693 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:04.948797 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager I0504 20:42:04.950811 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0504 20:42:04.950822 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... I0504 20:42:04.950835 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0504 20:42:04.950846 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... I0504 20:42:04.950849 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0504 20:42:04.950861 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... I0504 20:42:04.950877 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0504 20:42:04.950888 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0504 20:42:04.950888 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment E0504 20:42:04.950900 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0504 20:42:04.950904 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... E0504 20:42:04.950906 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0504 20:42:04.950905 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources I0504 20:42:04.950919 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... E0504 20:42:04.950955 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0504 20:42:04.952068 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0504 20:42:04.952079 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... E0504 20:42:04.952118 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0504 20:42:04.955960 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0504 20:42:04.957435 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0504 20:42:04.957446 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0504 20:42:04.957450 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0504 20:42:04.966553 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0504 20:42:04.967630 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0504 20:42:04.969769 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0504 20:42:04.969783 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0504 20:42:05.030295 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0504 20:42:05.030622 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceCreated' Created Namespace/cert-manager because it was missing I0504 20:42:05.039089 1 reflector.go:439] "Caches populated" type="*v1.ClusterIssuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:05.104527 1 reflector.go:439] "Caches populated" type="*v1.Issuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:05.123532 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0504 20:42:05.162707 1 reflector.go:439] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:05.233780 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:05.233812 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0504 20:42:05.272463 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0504 20:42:05.294410 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0504 20:42:05.360243 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0504 20:42:05.979047 1 reflector.go:439] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0504 20:42:06.016307 1 controller.go:286] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0504 20:42:06.016339 1 controller.go:289] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0504 20:42:06.221270 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0504 20:42:06.685060 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0504 20:42:06.743145 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0504 20:42:06.754062 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0504 20:42:06.831168 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0504 20:42:07.377974 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0504 20:42:07.465497 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0504 20:42:07.850109 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing E0504 20:42:08.684039 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-deployment reconciliation failed: Operation cannot be fulfilled on certmanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again" I0504 20:42:08.709626 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0504 20:42:08.778371 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing I0504 20:42:08.887297 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0504 20:42:08.921042 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0504 20:42:08.966844 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing I0504 20:42:08.996928 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0504 20:42:09.361353 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0504 20:42:09.511165 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing I0504 20:42:09.761316 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0504 20:42:10.049068 1 request.go:752] "Waited before sending request" delay="1.082184297s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0504 20:42:10.468563 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing E0504 20:42:10.917211 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0504 20:42:10.976077 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0504 20:42:11.235047 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0504 20:42:11.249018 1 request.go:752] "Waited before sending request" delay="1.160599342s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-static-resources--StaticResources&force=true" E0504 20:42:11.278868 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0504 20:42:11.383046 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0504 20:42:12.600629 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0504 20:42:13.428202 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0504 20:42:13.562960 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0504 20:42:14.186368 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0504 20:42:14.635182 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0504 20:42:14.848483 1 request.go:752] "Waited before sending request" delay="1.169812768s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0504 20:42:15.029193 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0504 20:42:15.696368 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0504 20:42:17.294636 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0504 20:42:17.343948 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0504 20:42:17.403216 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0504 20:42:17.662931 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager: rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0504 20:42:18.448576 1 request.go:752] "Waited before sending request" delay="1.120077498s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0504 20:42:19.380067 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0504 20:42:19.612307 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0504 20:42:20.886747 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0504 20:42:21.799396 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0504 20:42:22.262407 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0504 20:42:22.729215 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0504 20:42:24.048131 1 request.go:752] "Waited before sending request" delay="1.06001617s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" E0504 20:42:24.873141 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-tokenrequest-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0504 20:42:25.049005 1 request.go:752] "Waited before sending request" delay="1.15589384s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-deployment-reportDegraded&force=true" I0504 20:42:26.248437 1 request.go:752] "Waited before sending request" delay="1.161462734s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0504 20:42:29.122138 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0504 20:42:29.712016 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0504 20:42:34.248679 1 request.go:752] "Waited before sending request" delay="1.159694262s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0504 20:42:35.448293 1 request.go:752] "Waited before sending request" delay="1.189339018s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-deployment-Deployment&force=true" I0504 20:42:42.183220 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0504 20:42:42.220051 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0504 20:42:42.239428 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0504 20:42:42.279166 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"4d536254-c9ed-4881-b598-6816f0946868", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0504 20:52:06.861544 1 request.go:752] "Waited before sending request" delay="1.182523672s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0504 21:02:06.662763 1 request.go:752] "Waited before sending request" delay="1.183820842s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster"