Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-2213/e2e-tests/logs/non-voting-and-hidden.log Warning: version difference between client (1.35) and server (1.31) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.35) and server (1.31) exceeds the supported minor version skew of +/-1 Warning: version difference between client (1.35) and server (1.31) exceeds the supported minor version skew of +/-1 ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- grep: warning: stray \ before - grep: warning: stray \ before - error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- error: resource(s) were provided, but no name was specified error: resource(s) were provided, but no name was specified error: resource(s) were provided, but no name was specified error: resource(s) were provided, but no name was specified error: resource(s) were provided, but no name was specified error: resource(s) were provided, but no name was specified ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- ----------------------------------------------------------------------------------- cleaned up old namespaces psmdb-operator ----------------------------------------------------------------------------------- error: resource(s) were provided, but no name was specified ----------------------------------------------------------------------------------- create namespace psmdb-operator ----------------------------------------------------------------------------------- namespace/psmdb-operator created Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-2213-482da7af-11-cluster8" modified. ----------------------------------------------------------------------------------- start PSMDB operator: perconalab/percona-server-mongodb-operator:PR-2213-482da7af ----------------------------------------------------------------------------------- customresourcedefinition.apiextensions.k8s.io/perconaservermongodbbackups.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbrestores.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbs.psmdb.percona.com serverside-applied clusterrole.rbac.authorization.k8s.io/percona-server-mongodb-operator created serviceaccount/percona-server-mongodb-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-server-mongodb-operator created deployment.apps/percona-server-mongodb-operator created waiting for pod/percona-server-mongodb-operator-68bf6755c6-pzwlp to be ready.OK Print operator info from log 2026-01-23T12:22:26.361Z INFO setup Manager starting up {"gitCommit": "482da7afc76cb5e5983e0dafeee205d21b673bb3", "gitBranch": "PR-2213-482da7af", "buildTime": "", "goVersion": "go1.25.6", "os": "linux", "arch": "amd64"} ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- error: resource(s) were provided, but no name was specified error: resource(s) were provided, but no name was specified error: resource(s) were provided, but no name was specified error: resource(s) were provided, but no name was specified error: resource(s) were provided, but no name was specified error: resource(s) were provided, but no name was specified ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- ----------------------------------------------------------------------------------- cleaned up old namespaces non-voting-and-hidden-1805 ----------------------------------------------------------------------------------- error: resource(s) were provided, but no name was specified ----------------------------------------------------------------------------------- create namespace non-voting-and-hidden-1805 ----------------------------------------------------------------------------------- namespace/non-voting-and-hidden-1805 created Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-2213-482da7af-11-cluster8" modified. ----------------------------------------------------------------------------------- deploy cert manager ----------------------------------------------------------------------------------- namespace/cert-manager created namespace/cert-manager labeled namespace/cert-manager configured customresourcedefinition.apiextensions.k8s.io/challenges.acme.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/orders.acme.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/certificaterequests.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/certificates.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/clusterissuers.cert-manager.io created customresourcedefinition.apiextensions.k8s.io/issuers.cert-manager.io created serviceaccount/cert-manager-cainjector created serviceaccount/cert-manager created serviceaccount/cert-manager-webhook created clusterrole.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrole.rbac.authorization.k8s.io/cert-manager-cluster-view created clusterrole.rbac.authorization.k8s.io/cert-manager-view created clusterrole.rbac.authorization.k8s.io/cert-manager-edit created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrole.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrole.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-cainjector created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-issuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-clusterissuers created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificates created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-orders created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-challenges created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-ingress-shim created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-approve:cert-manager-io created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-controller-certificatesigningrequests created clusterrolebinding.rbac.authorization.k8s.io/cert-manager-webhook:subjectaccessreviews created role.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created role.rbac.authorization.k8s.io/cert-manager:leaderelection created role.rbac.authorization.k8s.io/cert-manager-tokenrequest created role.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created rolebinding.rbac.authorization.k8s.io/cert-manager-cainjector:leaderelection created rolebinding.rbac.authorization.k8s.io/cert-manager:leaderelection created rolebinding.rbac.authorization.k8s.io/cert-manager-tokenrequest created rolebinding.rbac.authorization.k8s.io/cert-manager-webhook:dynamic-serving created service/cert-manager-cainjector created service/cert-manager created service/cert-manager-webhook created deployment.apps/cert-manager-cainjector created deployment.apps/cert-manager created deployment.apps/cert-manager-webhook created mutatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created validatingwebhookconfiguration.admissionregistration.k8s.io/cert-manager-webhook created Warning: resource namespaces/cert-manager is missing the kubectl.kubernetes.io/last-applied-configuration annotation which is required by kubectl apply. kubectl apply should only be used on resources created declaratively by either kubectl create --save-config or kubectl apply. The missing annotation will be patched automatically. pod/cert-manager-cainjector-5dc9c8b4f7-2vggp condition met pod/cert-manager-df4b69479-9xvvp condition met pod/cert-manager-webhook-769bbb594d-d7jtm condition met ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created secret/gcp-cs-sa-key-secret created ----------------------------------------------------------------------------------- install MinIO: minio-service ----------------------------------------------------------------------------------- "minio" has been removed from your repositories "minio" has been added to your repositories NAME: minio-service LAST DEPLOYED: Fri Jan 23 12:25:44 2026 NAMESPACE: non-voting-and-hidden-1805 STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: MinIO can be accessed via port 9000 on the following DNS name from within your cluster: minio-service.non-voting-and-hidden-1805.cluster.local To access MinIO from localhost, run the below commands: 1. export POD_NAME=$(kubectl get pods --namespace non-voting-and-hidden-1805 -l "release=minio-service" -o jsonpath="{.items[0].metadata.name}") 2. kubectl port-forward $POD_NAME 9000 --namespace non-voting-and-hidden-1805 Read more about port forwarding here: http://kubernetes.io/docs/user-guide/kubectl/kubectl_port-forward/ You can now access MinIO server on http://localhost:9000. Follow the below steps to connect to MinIO server with mc client: 1. Download the MinIO mc client - https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart 2. export MC_HOST_minio-service-local=http://$(kubectl get secret --namespace non-voting-and-hidden-1805 minio-service -o jsonpath="{.data.rootUser}" | base64 --decode):$(kubectl get secret --namespace non-voting-and-hidden-1805 minio-service -o jsonpath="{.data.rootPassword}" | base64 --decode)@localhost:9000 3. mc ls minio-service-local waiting for pod/minio-service-549fcd79c5-zvtcj to be ready.OK service/minio-service created pod "aws-cli" deleted from non-voting-and-hidden-1805 namespace All commands and output from this session will be recorded in container logs, including credentials and sensitive information passed through the command prompt. If you don't see a command prompt, try pressing enter. deployment.apps/psmdb-client created secret/some-users created ----------------------------------------------------------------------------------- Creating PSMDB cluster with non-voting + hidden members ----------------------------------------------------------------------------------- [2026-01-23T12:26:25+0000] create PSMDB cluster some-name perconaservermongodb.psmdb.percona.com/some-name created [2026-01-23T12:26:28+0000] check if Pods are started waiting for pod/some-name-rs0-0 to be ready.......OK waiting for pod/some-name-rs0-1 to be ready.......OK waiting for pod/some-name-rs0-2 to be ready.....OK waiting for pod/some-name-rs0-nv-0 to be ready.OK waiting for pod/some-name-rs0-hidden-0 to be ready.OK waiting for pod/some-name-rs0-hidden-1 to be ready.OK Waiting for psmdb/some-name to reach ready state.................... [2026-01-23T12:28:51+0000] psmdb/some-name is ready: OK [2026-01-23T12:28:51+0000] check if statefulsets created with expected config [2026-01-23T12:28:52+0000] compare_kubectl: statefulset/some-name-rs0 OK [2026-01-23T12:28:53+0000] compare_kubectl: statefulset/some-name-rs0-nv OK [2026-01-23T12:28:55+0000] compare_kubectl: statefulset/some-name-rs0-hidden OK [2026-01-23T12:28:55+0000] check if rs.config is correct [2026-01-23T12:28:57+0000] nonVoting members: OK [2026-01-23T12:29:01+0000] hidden members: OK [2026-01-23T12:29:01+0000] create user myApp Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-rs0-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-hidden-1.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-nv-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-1.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-hidden-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-2.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("125736cd-8326-418d-94cd-21e6a46c2633") } Percona Server for MongoDB server version: v8.0.17-6 WARNING: shell and server versions do not match Successfully added user: { "user" : "myApp", "roles" : [ { "db" : "myApp", "role" : "readWrite" } ] } bye [2026-01-23T12:29:04+0000] write data Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-rs0-1.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-nv-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-hidden-1.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-2.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-hidden-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("ce9046ba-8743-419e-85e3-214ce9d98d7b") } Percona Server for MongoDB server version: v8.0.17-6 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye [2026-01-23T12:29:16+0000] compare data [2026-01-23T12:29:16+0000] running db.test.find() in myApp [2026-01-23T12:29:19+0000] running db.test.find() in myApp [2026-01-23T12:29:22+0000] running db.test.find() in myApp [2026-01-23T12:29:25+0000] running db.test.find() in myApp [2026-01-23T12:29:28+0000] running backup backup-logical perconaservermongodbbackup.psmdb.percona.com/backup-logical created waiting for backup-logical to reach ready state.......OK [2026-01-23T12:29:43+0000] drop collection Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-rs0-2.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-hidden-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-1.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-nv-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-hidden-1.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("eb5e7a83-fe69-4a41-a770-756ca683feca") } Percona Server for MongoDB server version: v8.0.17-6 WARNING: shell and server versions do not match switched to db myApp true bye [2026-01-23T12:29:46+0000] running restore restore-backup-logical perconaservermongodbrestore.psmdb.percona.com/restore-backup-logical created Waiting for the psmdb-restore/restore-backup-logical object to be created.OK Waiting psmdb-restore/restore-backup-logical to reach state "ready" .OK after 0 minutes waiting for cluster readyness.OK [2026-01-23T12:30:08+0000] compare data after restore-backup-logical [2026-01-23T12:30:08+0000] running db.test.find() in myApp [2026-01-23T12:30:11+0000] running db.test.find() in myApp [2026-01-23T12:30:14+0000] running db.test.find() in myApp [2026-01-23T12:30:17+0000] running db.test.find() in myApp [2026-01-23T12:30:19+0000] running backup backup-physical perconaservermongodbbackup.psmdb.percona.com/backup-physical created waiting for backup-physical to reach ready state......OK [2026-01-23T12:30:32+0000] drop collection Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-rs0-2.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-hidden-1.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-nv-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-1.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017,some-name-rs0-hidden-0.some-name-rs0.non-voting-and-hidden-1805.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb&replicaSet=rs0&ssl=false Implicit session: session { "id" : UUID("cdca3412-62a1-4e5e-a4d4-d0d501d9df52") } Percona Server for MongoDB server version: v8.0.17-6 WARNING: shell and server versions do not match switched to db myApp true bye [2026-01-23T12:30:35+0000] running restore restore-backup-physical perconaservermongodbrestore.psmdb.percona.com/restore-backup-physical created Waiting for the psmdb-restore/restore-backup-physical object to be created.OK Waiting psmdb-restore/restore-backup-physical to reach state "ready" ......OK after 5 minutes waiting for cluster readyness...........OK [2026-01-23T12:37:51+0000] compare data after restore-backup-physical [2026-01-23T12:37:51+0000] running db.test.find() in myApp [2026-01-23T12:37:53+0000] running db.test.find() in myApp [2026-01-23T12:37:56+0000] running db.test.find() in myApp [2026-01-23T12:37:59+0000] running db.test.find() in myApp ----------------------------------------------------------------------------------- test passed ----------------------------------------------------------------------------------- ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- ----------------------------------------------------------------------------------- Delete psmdb-backup ----------------------------------------------------------------------------------- NAME CLUSTER STORAGE DESTINATION TYPE SIZE STATUS COMPLETED AGE backup-logical some-name minio s3://operator-testing/2026-01-23T12:29:31Z logical 52.24KB ready 8m27s 8m34s backup-physical some-name minio s3://operator-testing/2026-01-23T12:30:22Z physical 989.53KB ready 7m34s 7m42s perconaservermongodbbackup.psmdb.percona.com "backup-logical" deleted from non-voting-and-hidden-1805 namespace perconaservermongodbbackup.psmdb.percona.com "backup-physical" deleted from non-voting-and-hidden-1805 namespace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted grep: warning: stray \ before - grep: warning: stray \ before - error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted namespace "cert-manager" deleted customresourcedefinition.apiextensions.k8s.io "challenges.acme.cert-manager.io" deleted customresourcedefinition.apiextensions.k8s.io "orders.acme.cert-manager.io" deleted customresourcedefinition.apiextensions.k8s.io "certificaterequests.cert-manager.io" deleted customresourcedefinition.apiextensions.k8s.io "certificates.cert-manager.io" deleted customresourcedefinition.apiextensions.k8s.io "clusterissuers.cert-manager.io" deleted customresourcedefinition.apiextensions.k8s.io "issuers.cert-manager.io" deleted serviceaccount "cert-manager-cainjector" deleted from cert-manager namespace serviceaccount "cert-manager" deleted from cert-manager namespace serviceaccount "cert-manager-webhook" deleted from cert-manager namespace clusterrole.rbac.authorization.k8s.io "cert-manager-cainjector" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-issuers" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-certificates" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-orders" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-challenges" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-cluster-view" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-view" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-edit" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" deleted clusterrole.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-cainjector" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-issuers" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-certificates" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-orders" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-challenges" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" deleted clusterrolebinding.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" deleted role.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" deleted from kube-system namespace role.rbac.authorization.k8s.io "cert-manager:leaderelection" deleted from kube-system namespace role.rbac.authorization.k8s.io "cert-manager-tokenrequest" deleted from cert-manager namespace role.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" deleted from cert-manager namespace rolebinding.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" deleted from kube-system namespace rolebinding.rbac.authorization.k8s.io "cert-manager:leaderelection" deleted from kube-system namespace rolebinding.rbac.authorization.k8s.io "cert-manager-tokenrequest" deleted from cert-manager namespace rolebinding.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" deleted from cert-manager namespace service "cert-manager-cainjector" deleted from cert-manager namespace service "cert-manager" deleted from cert-manager namespace service "cert-manager-webhook" deleted from cert-manager namespace deployment.apps "cert-manager-cainjector" deleted from cert-manager namespace deployment.apps "cert-manager" deleted from cert-manager namespace deployment.apps "cert-manager-webhook" deleted from cert-manager namespace mutatingwebhookconfiguration.admissionregistration.k8s.io "cert-manager-webhook" deleted validatingwebhookconfiguration.admissionregistration.k8s.io "cert-manager-webhook" deleted