W0505 13:11:25.575179 1 cmd.go:257] Using insecure, self-signed certificates I0505 13:11:25.575304 1 crypto.go:600] Generating new CA for cert-manager-operator-signer@1777986685 cert, and key in /tmp/serving-cert-4258117851/serving-signer.crt, /tmp/serving-cert-4258117851/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1777986685" is unset, resetting to 43800h0m0s! I0505 13:11:25.802174 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0505 13:11:25.802583 1 observer_polling.go:159] Starting file observer I0505 13:11:25.830500 1 builder.go:304] cert-manager-operator version - I0505 13:11:25.831159 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-4258117851/tls.crt::/tmp/serving-cert-4258117851/tls.key" I0505 13:11:26.129705 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0505 13:11:26.136076 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0505 13:11:26.136091 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0505 13:11:26.136110 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0505 13:11:26.136115 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0505 13:11:26.139685 1 secure_serving.go:57] Forcing use of http/1.1 only I0505 13:11:26.139690 1 genericapiserver.go:552] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete I0505 13:11:26.147917 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0505 13:11:26.147932 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0505 13:11:26.147963 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0505 13:11:26.147963 1 shared_informer.go:349] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0505 13:11:26.147980 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0505 13:11:26.148017 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0505 13:11:26.148322 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-4258117851/tls.crt::/tmp/serving-cert-4258117851/tls.key" I0505 13:11:26.148482 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-4258117851/tls.crt::/tmp/serving-cert-4258117851/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1777986685\" (2026-05-05 13:11:24 +0000 UTC to 2026-05-05 13:11:25 +0000 UTC (now=2026-05-05 13:11:26.148458222 +0000 UTC))" I0505 13:11:26.148749 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1777986686\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1777986685\" (2026-05-05 12:11:25 +0000 UTC to 2029-05-05 12:11:25 +0000 UTC (now=2026-05-05 13:11:26.14871728 +0000 UTC))" I0505 13:11:26.148784 1 secure_serving.go:211] Serving securely on [::]:8443 I0505 13:11:26.148869 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0505 13:11:26.148884 1 genericapiserver.go:702] [graceful-termination] waiting for shutdown to be initiated I0505 13:11:26.149217 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0505 13:11:26.159709 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0505 13:11:26.159730 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0505 13:11:26.159875 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0505 13:11:26.186890 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0505 13:11:26.186922 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"deddca65-c80d-420b-837c-cf53899dfe9e", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"17797", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-5b66478c58-hrssz_30a160c7-94a9-4471-90ac-bbab4ec28b2f became leader I0505 13:11:26.205295 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0505 13:11:26.205327 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0505 13:11:26.205387 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0505 13:11:26.205417 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0505 13:11:26.205433 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0505 13:11:26.205753 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0505 13:11:26.206167 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0505 13:11:26.206312 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0505 13:11:26.206374 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0505 13:11:26.222085 1 reflector.go:439] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.222095 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.222107 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.222087 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.222285 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.222370 1 reflector.go:439] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0505 13:11:26.225157 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.227050 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.229205 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.229213 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.229453 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.229510 1 reflector.go:439] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0505 13:11:26.229847 1 reflector.go:439] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.232723 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.235912 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0505 13:11:26.244645 1 features.go:133] "cluster featureset: spec.featureSet not in allowed list" logger="features" featureSet="" I0505 13:11:26.244665 1 features.go:195] "cluster feature gate: preview featureset not enabled" logger="features" feature="TrustManager" I0505 13:11:26.244672 1 setup_manager.go:121] "setting up unified operator manager" logger="setup-manager" I0505 13:11:26.244680 1 setup_manager.go:122] "controller" logger="setup-manager" version="" I0505 13:11:26.244688 1 setup_manager.go:123] "enabled controllers" logger="setup-manager" istioCSR=true trustManager=false I0505 13:11:26.248083 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0505 13:11:26.248097 1 shared_informer.go:356] "Caches are synced" controller="RequestHeaderAuthRequestController" I0505 13:11:26.248097 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0505 13:11:26.248396 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-05 12:49:22 +0000 UTC to 2036-05-02 12:49:22 +0000 UTC (now=2026-05-05 13:11:26.248363738 +0000 UTC))" I0505 13:11:26.248719 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-4258117851/tls.crt::/tmp/serving-cert-4258117851/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1777986685\" (2026-05-05 13:11:24 +0000 UTC to 2026-05-05 13:11:25 +0000 UTC (now=2026-05-05 13:11:26.248692312 +0000 UTC))" I0505 13:11:26.248944 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1777986686\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1777986685\" (2026-05-05 12:11:25 +0000 UTC to 2029-05-05 12:11:25 +0000 UTC (now=2026-05-05 13:11:26.248923951 +0000 UTC))" I0505 13:11:26.251286 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-05-05 12:49:24 +0000 UTC to 2036-05-02 12:49:24 +0000 UTC (now=2026-05-05 13:11:26.249792178 +0000 UTC))" I0505 13:11:26.251778 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-05-05 12:49:26 +0000 UTC to 2036-05-02 12:49:26 +0000 UTC (now=2026-05-05 13:11:26.251386703 +0000 UTC))" I0505 13:11:26.251823 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-05-05 12:49:27 +0000 UTC to 2036-05-02 12:49:27 +0000 UTC (now=2026-05-05 13:11:26.251803671 +0000 UTC))" I0505 13:11:26.251854 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-05-05 12:49:28 +0000 UTC to 2036-05-02 12:49:28 +0000 UTC (now=2026-05-05 13:11:26.251838493 +0000 UTC))" I0505 13:11:26.251882 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-05-05 12:49:31 +0000 UTC to 2036-05-02 12:49:31 +0000 UTC (now=2026-05-05 13:11:26.251868028 +0000 UTC))" I0505 13:11:26.251918 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2q3pe2f1gibhpiqftiuj8qs9m7aidsu5-kx-24cfdcdd54_customer-system-admin-signer@1777985477\" [] issuer=\"\" (2026-05-05 12:51:17 +0000 UTC to 2026-05-12 12:51:18 +0000 UTC (now=2026-05-05 13:11:26.251896642 +0000 UTC))" I0505 13:11:26.251963 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2q3pe2f1gibhpiqftiuj8qs9m7aidsu5-kx-24cfdcdd54_sre-system-admin-signer@1777985477\" [] issuer=\"\" (2026-05-05 12:51:17 +0000 UTC to 2026-05-12 12:51:18 +0000 UTC (now=2026-05-05 13:11:26.251944593 +0000 UTC))" I0505 13:11:26.251995 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-05 12:49:22 +0000 UTC to 2036-05-02 12:49:22 +0000 UTC (now=2026-05-05 13:11:26.251979486 +0000 UTC))" I0505 13:11:26.252330 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-4258117851/tls.crt::/tmp/serving-cert-4258117851/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1777986685\" (2026-05-05 13:11:24 +0000 UTC to 2026-05-05 13:11:25 +0000 UTC (now=2026-05-05 13:11:26.252305391 +0000 UTC))" I0505 13:11:26.252641 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1777986686\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1777986685\" (2026-05-05 12:11:25 +0000 UTC to 2029-05-05 12:11:25 +0000 UTC (now=2026-05-05 13:11:26.252618739 +0000 UTC))" I0505 13:11:26.259594 1 setup_manager.go:156] "setting up controller" logger="setup-manager" name="cert-manager-istio-csr-controller" I0505 13:11:26.259699 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0505 13:11:26.259809 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0505 13:11:26.259901 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0505 13:11:26.259917 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterIssuer" I0505 13:11:26.259941 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0505 13:11:26.259950 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0505 13:11:26.259963 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0505 13:11:26.259965 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Issuer" I0505 13:11:26.259982 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0505 13:11:26.260007 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0505 13:11:26.260021 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0505 13:11:26.259965 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0505 13:11:26.260100 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0505 13:11:26.260124 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0505 13:11:26.260209 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0505 13:11:26.260244 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0505 13:11:26.289095 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.289140 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.289144 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.289171 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.289179 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.289253 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.289099 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.289445 1 reflector.go:439] "Caches populated" type="*v1.Issuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.289631 1 reflector.go:439] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.289805 1 reflector.go:439] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.290067 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.290096 1 reflector.go:439] "Caches populated" type="*v1.ClusterIssuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.306124 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0505 13:11:26.306133 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment I0505 13:11:26.306137 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0505 13:11:26.306142 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... I0505 13:11:26.306145 1 base_controller.go:82] Caches are synced for DefaultCertManager I0505 13:11:26.306153 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0505 13:11:26.306158 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0505 13:11:26.306167 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... I0505 13:11:26.306228 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0505 13:11:26.306238 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... E0505 13:11:26.306281 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0505 13:11:26.306325 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0505 13:11:26.306336 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... I0505 13:11:26.306375 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0505 13:11:26.306384 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... E0505 13:11:26.306385 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0505 13:11:26.306384 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager I0505 13:11:26.306407 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0505 13:11:26.306413 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... I0505 13:11:26.306412 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources E0505 13:11:26.306420 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0505 13:11:26.306423 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... E0505 13:11:26.306466 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0505 13:11:26.311371 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0505 13:11:26.312909 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0505 13:11:26.312923 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0505 13:11:26.312931 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0505 13:11:26.314303 1 reflector.go:439] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" E0505 13:11:26.322312 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0505 13:11:26.322997 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0505 13:11:26.324018 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0505 13:11:26.324035 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0505 13:11:26.408598 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0505 13:11:26.409294 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceCreated' Created Namespace/cert-manager because it was missing I0505 13:11:26.450928 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0505 13:11:26.505801 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0505 13:11:26.570076 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:11:26.627038 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0505 13:11:26.652179 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0505 13:11:26.662681 1 controller.go:286] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0505 13:11:26.662699 1 controller.go:289] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0505 13:11:26.705108 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0505 13:11:26.712722 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0505 13:11:28.099483 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0505 13:11:28.154321 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0505 13:11:28.178667 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0505 13:11:28.199170 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0505 13:11:28.432856 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0505 13:11:29.597897 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing E0505 13:11:29.635375 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-deployment reconciliation failed: Operation cannot be fulfilled on certmanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again" I0505 13:11:29.701034 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0505 13:11:29.705168 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0505 13:11:29.724008 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0505 13:11:29.749075 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing I0505 13:11:29.859931 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0505 13:11:29.891229 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing I0505 13:11:30.249406 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0505 13:11:30.657955 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0505 13:11:31.006398 1 request.go:752] "Waited before sending request" delay="1.115079476s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0505 13:11:31.049156 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0505 13:11:31.479956 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing E0505 13:11:31.896812 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0505 13:11:32.206352 1 request.go:752] "Waited before sending request" delay="1.191473383s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" E0505 13:11:32.243992 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0505 13:11:32.259977 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0505 13:11:33.062341 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0505 13:11:33.251963 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0505 13:11:33.458776 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0505 13:11:33.871640 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing I0505 13:11:34.267618 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0505 13:11:35.053048 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0505 13:11:35.457561 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0505 13:11:36.006210 1 request.go:752] "Waited before sending request" delay="1.189601448s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0505 13:11:36.253771 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0505 13:11:37.341183 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0505 13:11:38.007131 1 request.go:752] "Waited before sending request" delay="1.146021455s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0505 13:11:38.014826 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0505 13:11:38.702379 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0505 13:11:38.724040 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0505 13:11:38.772071 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0505 13:11:39.021846 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager: rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0505 13:11:39.406292 1 request.go:752] "Waited before sending request" delay="1.175796986s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0505 13:11:39.663985 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0505 13:11:40.427233 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0505 13:11:40.436163 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0505 13:11:40.446278 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0505 13:11:40.478514 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0505 13:11:40.495884 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0505 13:11:41.457016 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0505 13:11:42.257119 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0505 13:11:42.664984 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0505 13:11:43.207147 1 request.go:752] "Waited before sending request" delay="1.173816437s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0505 13:11:43.474089 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0505 13:11:44.606388 1 request.go:752] "Waited before sending request" delay="1.132317265s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0505 13:11:45.806875 1 request.go:752] "Waited before sending request" delay="1.183362185s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-controller-static-resources--StaticResources&force=true" E0505 13:11:45.827327 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-tokenrequest-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0505 13:11:47.006589 1 request.go:752] "Waited before sending request" delay="1.378908055s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0505 13:11:49.559423 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0505 13:11:50.106973 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"a0b2dde2-c077-472b-8d3f-9a03861946a9", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0505 13:16:07.135801 1 request.go:752] "Waited before sending request" delay="1.005931572s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0505 13:18:50.545457 1 reflector.go:439] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0505 13:21:28.229484 1 request.go:752] "Waited before sending request" delay="1.18244747s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0505 13:31:28.230269 1 request.go:752] "Waited before sending request" delay="1.18253878s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0505 13:41:28.231805 1 request.go:752] "Waited before sending request" delay="1.19335834s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-static-resources--StaticResources&force=true"