[Note] Determining if client configuration exists for client/cluster diagnostics Info: Successfully read a client config file at '/root/.kube/config' Info: Using context for cluster-admin access: 'default/console-192-168-31-135-nip-io:8443/root' [Note] Performing systemd discovery [Note] Running diagnostic: ConfigContexts[default/console-192-168-31-135-nip-io:8443/system:admin] Description: Validate client config context is complete and has connectivity Info: For client config context 'default/console-192-168-31-135-nip-io:8443/system:admin': The server URL is 'https://console.192.168.31.135.nip.io:8443' The user authentication is 'system:admin/master:8443' The current project is 'default' Successfully requested project list; has access to project(s): [default kube-public kube-service-catalog kube-system logging management-infra openshift openshift-infra openshift-node openshift-template-service-broker ...] [Note] Running diagnostic: ConfigContexts[default/master:8443/system:admin] Description: Validate client config context is complete and has connectivity Info: For client config context 'default/master:8443/system:admin': The server URL is 'https://master:8443' The user authentication is 'system:admin/master:8443' The current project is 'default' Successfully requested project list; has access to project(s): [default kube-public kube-service-catalog kube-system logging management-infra openshift openshift-infra openshift-node openshift-template-service-broker ...] [Note] Running diagnostic: ConfigContexts[default/console-192-168-31-135-nip-io:8443/root] Description: Validate client config context is complete and has connectivity Info: The current client config context is 'default/console-192-168-31-135-nip-io:8443/root': The server URL is 'https://console.192.168.31.135.nip.io:8443' The user authentication is 'root/console-192-168-31-135-nip-io:8443' The current project is 'default' Successfully requested project list; has access to project(s): [default kube-public kube-service-catalog kube-system logging management-infra openshift openshift-infra openshift-node openshift-template-service-broker ...] [Note] Running diagnostic: DiagnosticPod Description: Create a pod to run diagnostics from the application standpoint Info: Output from the diagnostic pod (image openshift/origin-deployer:v3.9.0): [Note] Running diagnostic: PodCheckAuth Description: Check that service account credentials authenticate as expected Info: Service account token successfully authenticated to master Info: Service account token was authenticated by the integrated registry. [Note] Running diagnostic: PodCheckDns Description: Check that DNS within a pod works as expected [Note] Summary of diagnostics execution (version v3.9.0+0e3d24c-14): [Note] Completed with no errors or warnings seen. [Note] Running diagnostic: AggregatedLogging Description: Check aggregated logging integration for proper configuration Info: Did not find a DeploymentConfig to support optional component 'curator-ops'. If you require this component, please re-install or update logging and specify the appropriate variable to enable it. Info: Did not find a DeploymentConfig to support optional component 'es-ops'. If you require this component, please re-install or update logging and specify the appropriate variable to enable it. Info: Did not find a DeploymentConfig to support optional component 'kibana-ops'. If you require this component, please re-install or update logging and specify the appropriate variable to enable it. Info: Did not find a DeploymentConfig to support optional component 'mux'. If you require this component, please re-install or update logging and specify the appropriate variable to enable it. ERROR: [AGL0095 from diagnostic AggregatedLogging@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/aggregated_logging/diagnostic.go:129] There were no Pods found for DeploymentConfig 'logging-es-data-master-nck7hzw3'. Try running the following commands for additional information: $ oc describe dc logging-es-data-master-nck7hzw3 -n logging $ oc get events -n logging ERROR: [AGL0095 from diagnostic AggregatedLogging@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/aggregated_logging/diagnostic.go:129] There were no Pods found for DeploymentConfig 'logging-kibana'. Try running the following commands for additional information: $ oc describe dc logging-kibana -n logging $ oc get events -n logging ERROR: [AGL0225 from diagnostic AggregatedLogging@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/aggregated_logging/diagnostic.go:129] There are no endpoints found for service 'logging-es'. This means that no pods provide this service and this component is not functioning. ERROR: [AGL0225 from diagnostic AggregatedLogging@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/aggregated_logging/diagnostic.go:129] There are no endpoints found for service 'logging-es-cluster'. This means that no pods provide this service and this component is not functioning. Info: Looked for 'logging-es-ops' among the logging services for the project but did not find it. This optional component may not have been specified by logging install options. Info: Looked for 'logging-es-ops-cluster' among the logging services for the project but did not find it. This optional component may not have been specified by logging install options. ERROR: [AGL0225 from diagnostic AggregatedLogging@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/aggregated_logging/diagnostic.go:129] There are no endpoints found for service 'logging-kibana'. This means that no pods provide this service and this component is not functioning. Info: Looked for 'logging-kibana-ops' among the logging services for the project but did not find it. This optional component may not have been specified by logging install options. Info: Looked for 'logging-mux' among the logging services for the project but did not find it. This optional component may not have been specified by logging install options. [Note] Running diagnostic: AppCreate Description: Create an application and test that it deploys correctly. I0510 17:23:24.215528 109223 logs.go:41] Unsolicited response received on idle HTTP channel starting with "HTTP/1.0 200 OK\r\n"; err= Info: 17:23:18.287: Using project 'openshift-diagnostic-appcreate-6dv78' for diagnostic. Info: 17:23:23.009: App 'diagnostic-appcreate' is running Info: 17:23:23.713: Request to service address http://172.30.149.76:8080/ succeeded Info: 17:23:28.085: Request to route http://diagnostic-appcreate-openshift-diagnostic-appcreate-6dv78.apps.192.168.31.135.nip.io:80/ succeeded Info: App creation and readiness completed with success=true in 4.426485039s Info: Service creation and testing completed with success=true in 703.640005ms Info: Route creation and testing completed with success=true in 4.372578655s Info: Entire create/test completed with success=true in 9.798237745s [Note] Running diagnostic: ClusterRegistry Description: Check that there is a working Docker registry [Note] Running diagnostic: ClusterRoleBindings Description: Check that the default ClusterRoleBindings are present and contain the expected subjects Info: clusterrolebinding/system:controller:horizontal-pod-autoscaler has more subjects than expected. Use the `oc adm policy reconcile-cluster-role-bindings` command to update the role binding to remove extra subjects. Info: clusterrolebinding/system:controller:horizontal-pod-autoscaler has extra subject {ServiceAccount horizontal-pod-autoscaler openshift-infra}. Info: clusterrolebinding/system:controller:horizontal-pod-autoscaler has more subjects than expected. Use the `oc adm policy reconcile-cluster-role-bindings` command to update the role binding to remove extra subjects. Info: clusterrolebinding/system:controller:horizontal-pod-autoscaler has extra subject {ServiceAccount horizontal-pod-autoscaler kube-system}. [Note] Running diagnostic: ClusterRoles Description: Check that the default ClusterRoles are present and contain the expected permissions Info: clusterrole/admin has changed, but the existing role has more permissions than the new role. If you can confirm that the extra permissions are not required, you may use the 'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions. For example, $ oc adm policy reconcile-cluster-roles \ --additive-only=false --confirm Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["impersonate"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["localsubjectaccessreviews"], APIGroups:["authorization.k8s.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["rbac.authorization.k8s.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindings"], APIGroups:["authorization.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["roles"], APIGroups:["authorization.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["localresourceaccessreviews"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["localsubjectaccessreviews"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["subjectrulesreviews"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["localresourceaccessreviews"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["localsubjectaccessreviews"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["subjectrulesreviews"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicyreviews"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicyselfsubjectreviews"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicysubjectreviews"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicyreviews"], APIGroups:["security.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicyselfsubjectreviews"], APIGroups:["security.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podsecuritypolicysubjectreviews"], APIGroups:["security.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:["authorization.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:["authorization.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["rolebindingrestrictions"], APIGroups:["authorization.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/instantiate"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/instantiatebinary"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds/clone"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/instantiate"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildconfigs/instantiatebinary"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds/clone"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds/details"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["builds/details"], APIGroups:["build.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["admin"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["edit"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["view"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigrollbacks"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/instantiate"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/rollback"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigrollbacks"], APIGroups:["apps.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/instantiate"], APIGroups:["apps.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/rollback"], APIGroups:["apps.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimports"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["imagestreamimports"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes/custom-host"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes/custom-host"], APIGroups:["route.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourceaccessreviews"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["subjectaccessreviews"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["resourceaccessreviews"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["subjectaccessreviews"], APIGroups:["authorization.openshift.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["patch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["create"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["delete"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["get"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["list"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["update"]}. Info: clusterrole/admin has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["watch"]}. Info: clusterrole/edit has changed, but the existing role has more permissions than the new role. If you can confirm that the extra permissions are not required, you may use the 'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions. For example, $ oc adm policy reconcile-cluster-roles \ --additive-only=false --confirm Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/attach"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/exec"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/portforward"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/proxy"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["secrets"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["services/proxy"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["impersonate"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/rollback"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/instantiate"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/instantiatebinary"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds/clone"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/instantiate"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildconfigs/instantiatebinary"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds/clone"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds/details"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["builds/details"], APIGroups:["build.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["edit"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["view"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigrollbacks"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/instantiate"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/rollback"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigrollbacks"], APIGroups:["apps.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/instantiate"], APIGroups:["apps.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/rollback"], APIGroups:["apps.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/secrets"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreams/layers"], APIGroups:["image.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimports"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["imagestreamimports"], APIGroups:["image.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes/custom-host"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes/custom-host"], APIGroups:["route.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["networkpolicies"], APIGroups:["networking.k8s.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["deletecollection"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["patch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["create"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["delete"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["get"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["list"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["update"]}. Info: clusterrole/edit has extra permission PolicyRule{Resources:["podpresets"], APIGroups:["settings.k8s.io"], Verbs:["watch"]}. Info: clusterrole/view has changed, but the existing role has more permissions than the new role. If you can confirm that the extra permissions are not required, you may use the 'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions. For example, $ oc adm policy reconcile-cluster-roles \ --additive-only=false --confirm Info: clusterrole/view has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["configmaps"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["endpoints"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["persistentvolumeclaims"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["pods"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["serviceaccounts"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["services"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["bindings"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["events"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["limitranges"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["namespaces/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["pods/log"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["pods/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["resourcequotas/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["namespaces"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["statefulsets"], APIGroups:["apps"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["horizontalpodautoscalers"], APIGroups:["autoscaling"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["cronjobs"], APIGroups:["batch"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["jobs"], APIGroups:["batch"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["daemonsets"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deployments/scale"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["ingresses"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicasets/scale"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["replicationcontrollers/scale"], APIGroups:["extensions"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["poddisruptionbudgets"], APIGroups:["policy"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildconfigs/webhooks"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["builds/log"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["jenkins"], APIGroups:["build.openshift.io"], Verbs:["view"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/scale"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/log"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["deploymentconfigs/status"], APIGroups:["apps.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamimages"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreammappings"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreamtags"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["imagestreams/status"], APIGroups:["image.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["projects"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["projects"], APIGroups:["project.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["appliedclusterresourcequotas"], APIGroups:["quota.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes"], APIGroups:["route.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["routes/status"], APIGroups:["route.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["processedtemplates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateconfigs"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templateinstances"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["templates"], APIGroups:["template.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["buildlogs"], APIGroups:["build.openshift.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["resourcequotausages"], APIGroups:[""], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["servicebindings"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["get"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["list"]}. Info: clusterrole/view has extra permission PolicyRule{Resources:["serviceinstances"], APIGroups:["servicecatalog.k8s.io"], Verbs:["watch"]}. [Note] Running diagnostic: ClusterRouter Description: Check there is a working router [Note] Running diagnostic: MasterNode Description: Check if master is also running node (for Open vSwitch) Info: Found a node with same IP as master: master [Note] Running diagnostic: MetricsApiProxy Description: Check the integrated heapster metrics can be reached via the API proxy ERROR: [DClu4002 from diagnostic MetricsApiProxy@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/metrics.go:79] The heapster service exists in the openshift-infra project but does not have any endpoints at this time, so it is not available for the Horizontal Pod Autoscaler to use as a source of metrics. [Note] Running diagnostic: NetworkCheck Description: Create a pod on all schedulable nodes and run network diagnostics from the application standpoint ERROR: [DNet2006 from diagnostic NetworkCheck@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/network/run_pod.go:187] Creating network diagnostic pod "network-diag-pod-4hbh5" on node "master" with command "oc adm diagnostics inpod-networkcheck -l 1" failed: pods "network-diag-pod-4hbh5" is forbidden: unable to validate against any security context constraint: [provider restricted: .spec.securityContext.hostNetwork: Invalid value: true: Host network is not allowed to be used provider restricted: .spec.securityContext.hostPID: Invalid value: true: Host PID is not allowed to be used provider restricted: .spec.securityContext.hostIPC: Invalid value: true: Host IPC is not allowed to be used spec.volumes[0]: Invalid value: "hostPath": hostPath volumes are not allowed to be used spec.containers[0].securityContext.privileged: Invalid value: true: Privileged containers are not allowed spec.containers[0].securityContext.hostNetwork: Invalid value: true: Host network is not allowed to be used spec.containers[0].securityContext.hostPID: Invalid value: true: Host PID is not allowed to be used spec.containers[0].securityContext.hostIPC: Invalid value: true: Host IPC is not allowed to be used] [Note] Running diagnostic: NodeDefinitions Description: Check node records on master [Note] Running diagnostic: RouteCertificateValidation Description: Check all route certificates for certificates that might be rejected by extended validation. [Note] Running diagnostic: ServiceExternalIPs Description: Check for existing services with ExternalIPs that are disallowed by master config [Note] Running diagnostic: AnalyzeLogs Description: Check for recent problems in systemd service logs Info: Checking journalctl logs for 'origin-master-api' service Info: Checking journalctl logs for 'origin-node' service WARN: [DS2005 from diagnostic AnalyzeLogs@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/systemd/analyze_logs.go:128] Found 'origin-node' journald log message: W0510 16:46:49.109115 36618 subnets.go:55] Could not find an allocated subnet for node: master, Waiting... This warning occurs when the node is trying to request the SDN subnet it should be configured with according to the master, but either can't connect to it or has not yet been assigned a subnet. This can occur before the master becomes fully available and defines a record for the node to use; the node will wait until that occurs, so the presence of this message in the node log isn't necessarily a problem as long as the SDN is actually working, but this message may help indicate the problem if it is not working. If the master is available and this log message persists, then it may be a sign of a different misconfiguration. Check the master's URL in the node kubeconfig. * Is the protocol http? It should be https. * Can you reach the address and port from the node using curl -k? Info: Checking journalctl logs for 'docker' service [Note] Running diagnostic: MasterConfigCheck Description: Check the master config file [Note] Running diagnostic: NodeConfigCheck Description: Check the node config file Info: Found a node config file: /etc/origin/node/node-config.yaml [Note] Running diagnostic: UnitStatus Description: Check status for related systemd units [Note] Summary of diagnostics execution (version v3.9.0+0e3d24c-14): [Note] Warnings seen: 1 [Note] Errors seen: 7