W0515 11:11:39.379446 1 cmd.go:257] Using insecure, self-signed certificates I0515 11:11:39.379566 1 crypto.go:600] Generating new CA for cert-manager-operator-signer@1778843499 cert, and key in /tmp/serving-cert-3007309355/serving-signer.crt, /tmp/serving-cert-3007309355/serving-signer.key Validity period of the certificate for "cert-manager-operator-signer@1778843499" is unset, resetting to 43800h0m0s! I0515 11:11:39.638052 1 leaderelection.go:121] The leader election gives 4 retries and allows for 30s of clock skew. The kube-apiserver downtime tolerance is 78s. Worst non-graceful lease acquisition is 2m43s. Worst graceful lease acquisition is {26s}. I0515 11:11:39.638304 1 observer_polling.go:159] Starting file observer I0515 11:11:39.664997 1 builder.go:304] cert-manager-operator version - I0515 11:11:39.665565 1 dynamic_serving_content.go:116] "Loaded a new cert/key pair" name="serving-cert::/tmp/serving-cert-3007309355/tls.crt::/tmp/serving-cert-3007309355/tls.key" I0515 11:11:39.883268 1 requestheader_controller.go:255] Loaded a new request header values for RequestHeaderAuthRequestController I0515 11:11:39.890348 1 maxinflight.go:139] "Initialized nonMutatingChan" len=400 I0515 11:11:39.890364 1 maxinflight.go:145] "Initialized mutatingChan" len=200 I0515 11:11:39.890379 1 maxinflight.go:116] "Set denominator for readonly requests" limit=400 I0515 11:11:39.890384 1 maxinflight.go:120] "Set denominator for mutating requests" limit=200 I0515 11:11:39.893838 1 secure_serving.go:57] Forcing use of http/1.1 only I0515 11:11:39.893840 1 genericapiserver.go:552] MuxAndDiscoveryComplete has all endpoints registered and discovery information is complete I0515 11:11:39.898538 1 requestheader_controller.go:180] Starting RequestHeaderAuthRequestController I0515 11:11:39.898560 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0515 11:11:39.898573 1 shared_informer.go:349] "Waiting for caches to sync" controller="RequestHeaderAuthRequestController" I0515 11:11:39.898573 1 configmap_cafile_content.go:205] "Starting controller" name="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0515 11:11:39.898583 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0515 11:11:39.898592 1 shared_informer.go:349] "Waiting for caches to sync" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0515 11:11:39.898880 1 dynamic_serving_content.go:135] "Starting controller" name="serving-cert::/tmp/serving-cert-3007309355/tls.crt::/tmp/serving-cert-3007309355/tls.key" I0515 11:11:39.898931 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3007309355/tls.crt::/tmp/serving-cert-3007309355/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778843499\" (2026-05-15 11:11:38 +0000 UTC to 2026-05-15 11:11:39 +0000 UTC (now=2026-05-15 11:11:39.898906682 +0000 UTC))" I0515 11:11:39.899119 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778843499\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778843499\" (2026-05-15 10:11:39 +0000 UTC to 2029-05-15 10:11:39 +0000 UTC (now=2026-05-15 11:11:39.899103768 +0000 UTC))" I0515 11:11:39.899136 1 secure_serving.go:211] Serving securely on [::]:8443 I0515 11:11:39.899160 1 genericapiserver.go:702] [graceful-termination] waiting for shutdown to be initiated I0515 11:11:39.899162 1 tlsconfig.go:243] "Starting DynamicServingCertificateController" I0515 11:11:39.899240 1 leaderelection.go:257] attempting to acquire leader lease cert-manager-operator/cert-manager-operator-lock... I0515 11:11:39.902040 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0515 11:11:39.902041 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/authentication/request/headerrequest/requestheader_controller.go:183" I0515 11:11:39.902679 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/apiserver/pkg/server/dynamiccertificates/configmap_cafile_content.go:209" I0515 11:11:39.918401 1 leaderelection.go:271] successfully acquired lease cert-manager-operator/cert-manager-operator-lock I0515 11:11:39.918507 1 event.go:377] Event(v1.ObjectReference{Kind:"Lease", Namespace:"cert-manager-operator", Name:"cert-manager-operator-lock", UID:"feacbf9d-7f9c-43ef-8dd2-20d2ce69ab30", APIVersion:"coordination.k8s.io/v1", ResourceVersion:"17079", FieldPath:""}): type: 'Normal' reason: 'LeaderElection' cert-manager-operator-controller-manager-5b66478c58-xz857_894f7f1e-d1bb-4926-a2e3-02703440bc9d became leader I0515 11:11:39.934034 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-deployment I0515 11:11:39.934106 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-user-defined I0515 11:11:39.934039 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-deployment I0515 11:11:39.934056 1 base_controller.go:76] Waiting for caches to sync for DefaultCertManager I0515 11:11:39.934058 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-deployment I0515 11:11:39.934114 1 base_controller.go:76] Waiting for caches to sync for cert-manager-networkpolicy-static-resources--StaticResources I0515 11:11:39.934192 1 base_controller.go:76] Waiting for caches to sync for cert-manager-cainjector-static-resources--StaticResources I0515 11:11:39.934477 1 base_controller.go:76] Waiting for caches to sync for cert-manager-webhook-static-resources--StaticResources I0515 11:11:39.934729 1 base_controller.go:76] Waiting for caches to sync for cert-manager-controller-static-resources--StaticResources I0515 11:11:39.937554 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.937766 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.937985 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.938056 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.938228 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.939594 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.940003 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.941486 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.941792 1 reflector.go:439] "Caches populated" type="*v1.Infrastructure" reflector="github.com/openshift/client-go/config/informers/externalversions/factory.go:125" I0515 11:11:39.943323 1 reflector.go:439] "Caches populated" type="*v1.Namespace" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.947561 1 features.go:133] "cluster featureset: spec.featureSet not in allowed list" logger="features" featureSet="" I0515 11:11:39.947580 1 features.go:195] "cluster feature gate: preview featureset not enabled" logger="features" feature="TrustManager" I0515 11:11:39.947591 1 setup_manager.go:121] "setting up unified operator manager" logger="setup-manager" I0515 11:11:39.947602 1 setup_manager.go:122] "controller" logger="setup-manager" version="" I0515 11:11:39.947610 1 setup_manager.go:123] "enabled controllers" logger="setup-manager" istioCSR=true trustManager=false I0515 11:11:39.948097 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.948656 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.950535 1 reflector.go:439] "Caches populated" type="*v1.Secret" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.953160 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="k8s.io/client-go/informers/factory.go:160" I0515 11:11:39.965155 1 setup_manager.go:156] "setting up controller" logger="setup-manager" name="cert-manager-istio-csr-controller" I0515 11:11:39.965255 1 server.go:208] "Starting metrics server" logger="controller-runtime.metrics" I0515 11:11:39.965376 1 server.go:247] "Serving metrics server" logger="controller-runtime.metrics" bindAddress=":8080" secure=false I0515 11:11:39.965468 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterIssuer" I0515 11:11:39.965473 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Certificate" I0515 11:11:39.965488 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRoleBinding" I0515 11:11:39.965490 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Service" I0515 11:11:39.965506 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1alpha1.IstioCSR" I0515 11:11:39.965519 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ClusterRole" I0515 11:11:39.965532 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Role" I0515 11:11:39.965543 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Issuer" I0515 11:11:39.965521 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ConfigMap" I0515 11:11:39.965525 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.Deployment" I0515 11:11:39.965582 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.ServiceAccount" I0515 11:11:39.965624 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.NetworkPolicy" I0515 11:11:39.965626 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.RoleBinding" I0515 11:11:39.965657 1 controller.go:353] "Starting EventSource" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" source="kind source: *v1.PartialObjectMetadata" I0515 11:11:39.969705 1 reflector.go:439] "Caches populated" type="*v1.Service" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:39.972932 1 reflector.go:439] "Caches populated" type="*v1alpha1.CertManager" reflector="github.com/openshift/cert-manager-operator/pkg/operator/informers/externalversions/factory.go:125" I0515 11:11:39.973537 1 reflector.go:439] "Caches populated" type="*v1.Role" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:39.973609 1 reflector.go:439] "Caches populated" type="*v1.ClusterRole" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:39.973614 1 reflector.go:439] "Caches populated" type="*v1.ServiceAccount" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:39.973748 1 reflector.go:439] "Caches populated" type="*v1.ClusterRoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:39.974038 1 reflector.go:439] "Caches populated" type="*v1.RoleBinding" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:39.976190 1 reflector.go:439] "Caches populated" type="*v1.Deployment" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:39.976209 1 reflector.go:439] "Caches populated" type="*v1.NetworkPolicy" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:39.988721 1 reflector.go:439] "Caches populated" type="*v1.PartialObjectMetadata" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:39.998626 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::client-ca-file" I0515 11:11:39.998647 1 shared_informer.go:356] "Caches are synced" controller="client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" I0515 11:11:39.998664 1 shared_informer.go:356] "Caches are synced" controller="RequestHeaderAuthRequestController" I0515 11:11:39.998845 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-15 10:56:12 +0000 UTC to 2036-05-12 10:56:12 +0000 UTC (now=2026-05-15 11:11:39.998825092 +0000 UTC))" I0515 11:11:39.999143 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3007309355/tls.crt::/tmp/serving-cert-3007309355/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778843499\" (2026-05-15 11:11:38 +0000 UTC to 2026-05-15 11:11:39 +0000 UTC (now=2026-05-15 11:11:39.999122155 +0000 UTC))" I0515 11:11:39.999410 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778843499\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778843499\" (2026-05-15 10:11:39 +0000 UTC to 2029-05-15 10:11:39 +0000 UTC (now=2026-05-15 11:11:39.999394223 +0000 UTC))" I0515 11:11:39.999593 1 tlsconfig.go:181] "Loaded client CA" index=0 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-control-plane-signer\" [] issuer=\"\" (2026-05-15 10:56:13 +0000 UTC to 2036-05-12 10:56:13 +0000 UTC (now=2026-05-15 11:11:39.999572389 +0000 UTC))" I0515 11:11:39.999626 1 tlsconfig.go:181] "Loaded client CA" index=1 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-apiserver-to-kubelet-signer\" [] issuer=\"\" (2026-05-15 10:56:17 +0000 UTC to 2036-05-12 10:56:17 +0000 UTC (now=2026-05-15 11:11:39.999610354 +0000 UTC))" I0515 11:11:39.999659 1 tlsconfig.go:181] "Loaded client CA" index=2 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"admin-kubeconfig-signer\" [] issuer=\"\" (2026-05-15 10:56:18 +0000 UTC to 2036-05-12 10:56:18 +0000 UTC (now=2026-05-15 11:11:39.999638757 +0000 UTC))" I0515 11:11:39.999690 1 tlsconfig.go:181] "Loaded client CA" index=3 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"hcco-signer\" [] issuer=\"\" (2026-05-15 10:56:21 +0000 UTC to 2036-05-12 10:56:21 +0000 UTC (now=2026-05-15 11:11:39.999675992 +0000 UTC))" I0515 11:11:39.999716 1 tlsconfig.go:181] "Loaded client CA" index=4 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"kube-csr-signer\" [] issuer=\"\" (2026-05-15 10:56:22 +0000 UTC to 2036-05-12 10:56:22 +0000 UTC (now=2026-05-15 11:11:39.999703005 +0000 UTC))" I0515 11:11:39.999746 1 tlsconfig.go:181] "Loaded client CA" index=5 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2qaaolrg7rkor80uipaklgnphfm5f3o9-kx-e7c66a2aec_customer-system-admin-signer@1778842691\" [] issuer=\"\" (2026-05-15 10:58:11 +0000 UTC to 2026-05-22 10:58:12 +0000 UTC (now=2026-05-15 11:11:39.999729624 +0000 UTC))" I0515 11:11:39.999793 1 tlsconfig.go:181] "Loaded client CA" index=6 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"ocm-production-2qaaolrg7rkor80uipaklgnphfm5f3o9-kx-e7c66a2aec_sre-system-admin-signer@1778842691\" [] issuer=\"\" (2026-05-15 10:58:11 +0000 UTC to 2026-05-22 10:58:12 +0000 UTC (now=2026-05-15 11:11:39.999759459 +0000 UTC))" I0515 11:11:39.999822 1 tlsconfig.go:181] "Loaded client CA" index=7 certName="client-ca::kube-system::extension-apiserver-authentication::client-ca-file,client-ca::kube-system::extension-apiserver-authentication::requestheader-client-ca-file" certDetail="\"aggregator-signer\" [] issuer=\"\" (2026-05-15 10:56:12 +0000 UTC to 2036-05-12 10:56:12 +0000 UTC (now=2026-05-15 11:11:39.999807545 +0000 UTC))" I0515 11:11:40.000106 1 tlsconfig.go:203] "Loaded serving cert" certName="serving-cert::/tmp/serving-cert-3007309355/tls.crt::/tmp/serving-cert-3007309355/tls.key" certDetail="\"localhost\" [serving] validServingFor=[localhost] issuer=\"cert-manager-operator-signer@1778843499\" (2026-05-15 11:11:38 +0000 UTC to 2026-05-15 11:11:39 +0000 UTC (now=2026-05-15 11:11:40.000080751 +0000 UTC))" I0515 11:11:40.000337 1 named_certificates.go:53] "Loaded SNI cert" index=0 certName="self-signed loopback" certDetail="\"apiserver-loopback-client@1778843499\" [serving] validServingFor=[apiserver-loopback-client] issuer=\"apiserver-loopback-client-ca@1778843499\" (2026-05-15 10:11:39 +0000 UTC to 2029-05-15 10:11:39 +0000 UTC (now=2026-05-15 11:11:40.000320684 +0000 UTC))" I0515 11:11:40.012514 1 reflector.go:439] "Caches populated" type="*v1alpha1.IstioCSR" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:40.034134 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-deployment I0515 11:11:40.034154 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-deployment controller ... I0515 11:11:40.034271 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-static-resources--StaticResources I0515 11:11:40.034284 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-static-resources--StaticResources controller ... I0515 11:11:40.034293 1 base_controller.go:82] Caches are synced for cert-manager-webhook-deployment I0515 11:11:40.034296 1 base_controller.go:82] Caches are synced for cert-manager-networkpolicy-user-defined I0515 11:11:40.034308 1 base_controller.go:82] Caches are synced for DefaultCertManager I0515 11:11:40.034311 1 base_controller.go:119] Starting #1 worker of cert-manager-networkpolicy-user-defined controller ... I0515 11:11:40.034283 1 base_controller.go:82] Caches are synced for cert-manager-controller-deployment I0515 11:11:40.034319 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-deployment controller ... I0515 11:11:40.034312 1 base_controller.go:119] Starting #1 worker of DefaultCertManager controller ... I0515 11:11:40.034302 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-deployment controller ... I0515 11:11:40.034353 1 base_controller.go:82] Caches are synced for cert-manager-cainjector-static-resources--StaticResources I0515 11:11:40.034387 1 base_controller.go:119] Starting #1 worker of cert-manager-cainjector-static-resources--StaticResources controller ... E0515 11:11:40.034398 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0515 11:11:40.034437 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0515 11:11:40.034552 1 base_controller.go:82] Caches are synced for cert-manager-webhook-static-resources--StaticResources I0515 11:11:40.034538 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'StatusNotFound' Creating "cluster" certmanager I0515 11:11:40.034561 1 base_controller.go:119] Starting #1 worker of cert-manager-webhook-static-resources--StaticResources controller ... E0515 11:11:40.034609 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0515 11:11:40.034889 1 base_controller.go:82] Caches are synced for cert-manager-controller-static-resources--StaticResources I0515 11:11:40.034903 1 base_controller.go:119] Starting #1 worker of cert-manager-controller-static-resources--StaticResources controller ... E0515 11:11:40.034947 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0515 11:11:40.039962 1 base_controller.go:279] "Unhandled Error" err="cert-manager-networkpolicy-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0515 11:11:40.041037 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0515 11:11:40.041058 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" E0515 11:11:40.041070 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: certmanager.operator.openshift.io \"cluster\" not found" I0515 11:11:40.070469 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationCreated' Created MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0515 11:11:40.076801 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'NamespaceCreated' Created Namespace/cert-manager because it was missing I0515 11:11:40.091076 1 reflector.go:439] "Caches populated" type="*v1.ClusterIssuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:40.137144 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationCreated' Created ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it was missing I0515 11:11:40.137203 1 reflector.go:439] "Caches populated" type="*v1.Issuer" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:40.175367 1 reflector.go:439] "Caches populated" type="*v1.ConfigMap" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:40.194675 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-webhook -n cert-manager because it was missing I0515 11:11:40.279894 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0515 11:11:40.348768 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager: rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found I0515 11:11:40.423705 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-cluster-view because it was missing I0515 11:11:40.466752 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager-cainjector -n cert-manager because it was missing I0515 11:11:41.037663 1 reflector.go:439] "Caches populated" type="*v1.Certificate" reflector="sigs.k8s.io/controller-runtime/pkg/cache/internal/informers.go:114" I0515 11:11:41.067664 1 controller.go:286] "Starting Controller" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" I0515 11:11:41.067687 1 controller.go:289] "Starting workers" logger="operator-manager" controller="cert-manager-istio-csr-controller" controllerGroup="operator.openshift.io" controllerKind="IstioCSR" worker count=1 I0515 11:11:41.196453 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector because it was missing I0515 11:11:41.413663 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0515 11:11:41.429879 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-webhook -n cert-manager because it was missing I0515 11:11:41.593000 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0515 11:11:42.370124 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system: rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found I0515 11:11:42.953904 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0515 11:11:43.035196 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificates because it was missing I0515 11:11:43.206279 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0515 11:11:43.225072 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager-cainjector -n cert-manager because it was missing I0515 11:11:43.252166 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-cainjector -n cert-manager because it was missing E0515 11:11:43.552435 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-deployment reconciliation failed: Operation cannot be fulfilled on certmanagers.operator.openshift.io \"cluster\": the object has been modified; please apply your changes to the latest version and try again" I0515 11:11:43.799935 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews because it was missing I0515 11:11:43.828327 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager-webhook -n cert-manager because it was missing I0515 11:11:44.016293 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0515 11:11:44.393128 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-challenges because it was missing I0515 11:11:44.804546 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing I0515 11:11:44.934305 1 request.go:752] "Waited before sending request" delay="1.105943962s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:11:45.207112 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers because it was missing E0515 11:11:45.360328 1 base_controller.go:279] "Unhandled Error" err="cert-manager-cainjector-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/cainjector/cert-manager-cainjector-leaderelection-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-cainjector:leaderelection\" not found" I0515 11:11:45.590269 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0515 11:11:45.934575 1 request.go:752] "Waited before sending request" delay="1.144995067s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" E0515 11:11:46.246228 1 base_controller.go:279] "Unhandled Error" err="cert-manager-webhook-static-resources--StaticResources reconciliation failed: \"cert-manager-deployment/webhook/cert-manager-webhook-dynamic-serving-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-webhook:dynamic-serving\" not found" I0515 11:11:46.696448 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim because it was missing I0515 11:11:46.989103 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection -n kube-system because it was missing I0515 11:11:47.399042 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving -n cert-manager because it was missing I0515 11:11:47.803231 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0515 11:11:47.847320 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'DeploymentCreated' Created Deployment.apps/cert-manager -n cert-manager because it was missing I0515 11:11:48.890105 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-issuers because it was missing I0515 11:11:49.498917 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0515 11:11:49.934831 1 request.go:752] "Waited before sending request" delay="1.12681949s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:11:50.211739 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-orders because it was missing I0515 11:11:50.821400 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-edit because it was missing I0515 11:11:51.196871 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system: rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found I0515 11:11:51.534679 1 request.go:752] "Waited before sending request" delay="1.182192464s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:11:52.360066 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0515 11:11:52.395166 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceAccountCreated' Created ServiceAccount/cert-manager -n cert-manager because it was missing I0515 11:11:52.448768 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ServiceCreated' Created Service/cert-manager -n cert-manager because it was missing I0515 11:11:52.741252 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Warning' reason: 'RoleBindingCreateFailed' Failed to create RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager: rolebindings.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found I0515 11:11:53.534470 1 request.go:752] "Waited before sending request" delay="1.16231435s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:11:53.813076 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleCreated' Created Role.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0515 11:11:54.426880 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-view because it was missing I0515 11:11:54.685158 1 admissionregistration.go:69] MutatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/mutate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","rules":[{"apiGroups":["cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE"],"resources":["certificaterequests"]}],"sideEffects":"None","timeoutSeconds":30}]} I0515 11:11:54.707126 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'MutatingWebhookConfigurationUpdated' Updated MutatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0515 11:11:54.729363 1 admissionregistration.go:144] ValidatingWebhookConfiguration "/cert-manager-webhook" changes: {"webhooks":[{"admissionReviewVersions":["v1"],"clientConfig":{"caBundle":"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","service":{"name":"cert-manager-webhook","namespace":"cert-manager","path":"/validate"}},"failurePolicy":"Fail","matchPolicy":"Equivalent","name":"webhook.cert-manager.io","namespaceSelector":{"matchExpressions":[{"key":"cert-manager.io/disable-validation","operator":"NotIn","values":["true"]}]},"rules":[{"apiGroups":["cert-manager.io","acme.cert-manager.io"],"apiVersions":["v1"],"operations":["CREATE","UPDATE"],"resources":["*/*"]}],"sideEffects":"None","timeoutSeconds":30}]} I0515 11:11:54.758240 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ValidatingWebhookConfigurationUpdated' Updated ValidatingWebhookConfiguration.admissionregistration.k8s.io/cert-manager-webhook because it changed I0515 11:11:54.970001 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0515 11:11:55.134554 1 request.go:752] "Waited before sending request" delay="1.152194983s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:11:55.895887 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io because it was missing I0515 11:11:56.627179 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleCreated' Created ClusterRole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0515 11:11:57.134222 1 request.go:752] "Waited before sending request" delay="1.177457546s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:11:57.441056 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'ClusterRoleBindingCreated' Created ClusterRoleBinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests because it was missing I0515 11:11:58.735203 1 request.go:752] "Waited before sending request" delay="1.177101172s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" E0515 11:11:59.563708 1 base_controller.go:279] "Unhandled Error" err="cert-manager-controller-static-resources--StaticResources reconciliation failed: [\"cert-manager-deployment/controller/cert-manager-leaderelection-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager:leaderelection\" not found, \"cert-manager-deployment/controller/cert-manager-tokenrequest-rb.yaml\" (string): rolebindings.rbac.authorization.k8s.io \"cert-manager-tokenrequest\" not found]" I0515 11:11:59.934223 1 request.go:752] "Waited before sending request" delay="1.392587168s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-cainjector-deployment-reportDegraded&force=true" I0515 11:12:00.934443 1 request.go:752] "Waited before sending request" delay="1.190501808s" reason="client-side throttling, not priority and fairness" verb="PATCH" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster/status?fieldManager=cert-manager-webhook-static-resources--StaticResources&force=true" I0515 11:12:03.318017 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager:leaderelection -n kube-system because it was missing I0515 11:12:04.058354 1 event.go:377] Event(v1.ObjectReference{Kind:"Deployment", Namespace:"cert-manager-operator", Name:"cert-manager-operator-controller-manager", UID:"bb457a8e-454c-4aed-a335-2a6d138ddcd4", APIVersion:"apps/v1", ResourceVersion:"", FieldPath:""}): type: 'Normal' reason: 'RoleBindingCreated' Created RoleBinding.rbac.authorization.k8s.io/cert-manager-tokenrequest -n cert-manager because it was missing I0515 11:12:04.135054 1 request.go:752] "Waited before sending request" delay="1.189018526s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:12:07.734601 1 request.go:752] "Waited before sending request" delay="1.180078891s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:12:09.135080 1 request.go:752] "Waited before sending request" delay="1.162445231s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:12:17.134705 1 request.go:752] "Waited before sending request" delay="1.179261847s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:15:59.741751 1 request.go:752] "Waited before sending request" delay="1.171285198s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:21:43.545085 1 request.go:752] "Waited before sending request" delay="1.187440945s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:31:41.750270 1 request.go:752] "Waited before sending request" delay="1.001264576s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster" I0515 11:31:43.551224 1 request.go:752] "Waited before sending request" delay="1.188151856s" reason="client-side throttling, not priority and fairness" verb="GET" URL="https://172.30.0.1:443/apis/operator.openshift.io/v1alpha1/certmanagers/cluster"