While accessing OKD wenconsole (https://c1-ocp:8443/console/) i am getting following error
{
"kind": "Status",
"apiVersion": "v1",
"metadata": {},
"status": "Failure",
"message": "forbidden: User \"system:anonymous\" cannot get path \"/console/\": User \"system:anonymous\" cannot \"get\" on \"/console/\"",
"reason": "Forbidden",
"details": {},
"code": 403
}
[root@c1-ocp openshift-origin-server-v3.10.0-dd10d17-linux-64bit]# ./openshift version
openshift v3.10.0+dd10d17
Install OKD "All-in-One Server" using below links
https://docs.okd.io/latest/getting_started/administrators.html#downloading-the-binary
Follow steps as mentioned in guideline to start openshift and access
$ export PATH="$(pwd)":$PATH
Launch the server:
sudo ./openshift start
Access https://c1-ocp:8443/console/
{
"kind": "Status",
"apiVersion": "v1",
"metadata": {},
"status": "Failure",
"message": "forbidden: User \"system:anonymous\" cannot get path \"/console/\": User \"system:anonymous\" cannot \"get\" on \"/console/\"",
"reason": "Forbidden",
"details": {},
"code": 403
}
Console should be available
[try to run $ oc adm diagnostics (or oadm diagnostics) command if possible]
[root@c1-ocp openshift-origin-server-v3.10.0-dd10d17-linux-64bit]# ./oc adm diagnostics
[Note] Determining if client configuration exists for client/cluster diagnostics
Info: Successfully read a client config file at '/home/vagrant/openshift-origin-server-v3.10.0-dd10d17-linux-64bit/openshift.local.config/master/admin.kubeconfig'
Info: Using context for cluster-admin access: 'default/10-0-2-15:8443/system:admin'
[Note] Running diagnostic: ConfigContexts[default/10-0-2-15:8443/system:admin]
Description: Validate client config context is complete and has connectivity
Info: The current client config context is 'default/10-0-2-15:8443/system:admin':
The server URL is 'https://10.0.2.15:8443'
The user authentication is 'system:admin/10-0-2-15:8443'
The current project is 'default'
Successfully requested project list; has access to project(s):
[default kube-public kube-system openshift openshift-infra openshift-node]
[Note] Running diagnostic: DiagnosticPod
Description: Create a pod to run diagnostics from the application standpoint
WARN: [DCli2013 from diagnostic DiagnosticPod@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/client/pod/run_diagnostics_pod.go:196]
See the warnings below in the output from the diagnostic pod:
[Note] Running diagnostic: PodCheckAuth
Description: Check that service account credentials authenticate as expected
Info: Service account token successfully authenticated to master
WARN: [DP1007 from diagnostic PodCheckAuth@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/client/pod/in_pod/auth.go:115]
DNS resolution for registry address docker-registry.default.svc.cluster.local returned no results; either the integrated registry is not deployed, or container DNS co
nfiguration is incorrect.
[Note] Running diagnostic: PodCheckDns
Description: Check that DNS within a pod works as expected
[Note] Summary of diagnostics execution (version v3.10.0+e3465d0-44):
[Note] Warnings seen: 1
[Note] Skipping diagnostic: AggregatedLogging
Description: Check aggregated logging integration for proper configuration
Because: Logging project does not exist
[Note] Running diagnostic: AppCreate
Description: Create an application and test that it deploys correctly.
I0914 09:06:51.719439 3572 logs.go:49] Unsolicited response received on idle HTTP channel starting with "HTTP/1.0 200 OK\r\nContent-Type: text/plain\r\n\r\nHello\r\n"; err=<nil>
Info: 09:06:48.034: Using project 'openshift-diagnostic-appcreate-gq27f' for diagnostic.
Info: 09:06:49.845: App 'diagnostic-appcreate' is running
Info: 09:06:51.217: Request to service address http://172.30.122.179:8080/ succeeded
ERROR: [DCluAC028 from diagnostic AppCreate@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/app_create/route.go:97]
09:07:01.225: Route was not admitted by a router before timeout (10 sec)
Diagnostics waited for the 'diagnostic-appcreate' route to be admitted by a router (making the
application available via that route) after the test app started running.
However, this did not occur within the timeout.
Some of the reasons why this may fail include:
* There is no router running to accept routes
* The available router(s) are configured not to accept the route
* The router simply needs longer to admit the route (you can increase the timeout)
* The app stopped responding or was killed
Info: App creation and readiness completed with success=true in 1.61385957s
Info: Service creation and testing completed with success=true in 1.371270717s
Info: Route creation and testing completed with success=false in 10.007870088s
Info: Entire create/test completed with success=false in 13.191046324s
[Note] Running diagnostic: ClusterRegistry
Description: Check that there is a working Docker registry
WARN: [DClu1002 from diagnostic ClusterRegistry@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/registry.go:194]
There is no "docker-registry" service in project "default". This is not strictly required to
be present; however, it is required for builds, and its absence probably
indicates an incomplete installation.
Please consult the documentation and use the 'oc adm registry' command
to create a Docker registry.
[Note] Running diagnostic: ClusterRoleBindings
Description: Check that the default ClusterRoleBindings are present and contain the expected subjects
Info: clusterrolebinding/system:controller:horizontal-pod-autoscaler has more subjects than expected.
Use the `oc adm policy reconcile-cluster-role-bindings` command to update the role binding to remove extra subjects.
Info: clusterrolebinding/system:controller:horizontal-pod-autoscaler has extra subject {ServiceAccount horizontal-pod-autoscaler openshift-infra}.
Info: clusterrolebinding/system:controller:horizontal-pod-autoscaler has more subjects than expected.
Use the `oc adm policy reconcile-cluster-role-bindings` command to update the role binding to remove extra subjects.
Info: clusterrolebinding/system:controller:horizontal-pod-autoscaler has extra subject {ServiceAccount horizontal-pod-autoscaler kube-system}.
[Note] Running diagnostic: ClusterRoles
Description: Check that the default ClusterRoles are present and contain the expected permissions
Info: clusterrole/admin has changed, but the existing role has more permissions than the new role.
If you can confirm that the extra permissions are not required, you may use the
'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions.
For example,
$ oc adm policy reconcile-cluster-roles \
--additive-only=false --confirm
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["impersonate"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.k8s.io"], Resources:["localsubjectaccessreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["rolebindings"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["rbac.authorization.k8s.io"], Resources:["roles"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindings"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["roles"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindings"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["roles"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["localresourceaccessreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["localsubjectaccessreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["subjectrulesreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["localresourceaccessreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["localsubjectaccessreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["subjectrulesreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["podsecuritypolicyreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["podsecuritypolicyselfsubjectreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["podsecuritypolicysubjectreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["security.openshift.io"], Resources:["podsecuritypolicyreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["security.openshift.io"], Resources:["podsecuritypolicyselfsubjectreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["security.openshift.io"], Resources:["podsecuritypolicysubjectreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindingrestrictions"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindingrestrictions"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["rolebindingrestrictions"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindingrestrictions"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindingrestrictions"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["rolebindingrestrictions"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/instantiate"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/instantiatebinary"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds/clone"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/instantiate"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/instantiatebinary"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/clone"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["builds/details"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/details"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["admin"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["edit"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["view"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigrollbacks"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/instantiate"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/rollback"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigrollbacks"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/instantiate"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/rollback"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/layers"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/layers"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/layers"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/layers"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimports"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimports"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes/custom-host"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/custom-host"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["delete"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["deletecollection"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["patch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["update"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["get"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["list"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["watch"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["resourceaccessreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:[""], Resources:["subjectaccessreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["resourceaccessreviews"], Verbs:["create"]}.
Info: clusterrole/admin has extra permission PolicyRule{APIGroups:["authorization.openshift.io"], Resources:["subjectaccessreviews"], Verbs:["create"]}.
Info: clusterrole/edit has changed, but the existing role has more permissions than the new role.
If you can confirm that the extra permissions are not required, you may use the
'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions.
For example,
$ oc adm policy reconcile-cluster-roles \
--additive-only=false --confirm
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/attach"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/exec"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/portforward"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/proxy"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["secrets"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["services/proxy"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["impersonate"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/rollback"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/rollback"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/instantiate"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/instantiatebinary"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds/clone"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/instantiate"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/instantiatebinary"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/clone"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["builds/details"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/details"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["edit"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["view"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigrollbacks"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/instantiate"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/rollback"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigrollbacks"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/instantiate"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/rollback"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/secrets"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/secrets"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/layers"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/layers"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/layers"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/layers"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimports"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimports"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes/custom-host"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/custom-host"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["create"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["delete"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["deletecollection"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["patch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["update"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["watch"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["get"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["list"]}.
Info: clusterrole/edit has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["watch"]}.
Info: clusterrole/view has changed, but the existing role has more permissions than the new role.
If you can confirm that the extra permissions are not required, you may use the
'oc adm policy reconcile-cluster-roles' command to update the role to reduce permissions.
For example,
$ oc adm policy reconcile-cluster-roles \
--additive-only=false --confirm
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["configmaps"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["endpoints"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["persistentvolumeclaims"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["serviceaccounts"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["services"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["bindings"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["events"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["limitranges"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces/status"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/log"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["pods/status"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["replicationcontrollers/status"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotas/status"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["namespaces"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["daemonsets"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps"], Resources:["statefulsets/scale"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["autoscaling"], Resources:["horizontalpodautoscalers"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["cronjobs"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["batch"], Resources:["jobs"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["daemonsets"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["deployments/scale"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["ingresses"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicasets/scale"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["extensions"], Resources:["replicationcontrollers/scale"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["policy"], Resources:["poddisruptionbudgets"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["networking.k8s.io"], Resources:["networkpolicies"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildconfigs/webhooks"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["builds/log"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["builds/log"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["jenkins"], Verbs:["view"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/scale"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/log"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["apps.openshift.io"], Resources:["deploymentconfigs/status"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamimages"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreammappings"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreamtags"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["image.openshift.io"], Resources:["imagestreams/status"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["projects"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["project.openshift.io"], Resources:["projects"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["quota.openshift.io"], Resources:["appliedclusterresourcequotas"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["routes/status"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["route.openshift.io"], Resources:["routes/status"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["processedtemplates"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateconfigs"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templateinstances"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["templates"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["processedtemplates"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateconfigs"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templateinstances"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["template.openshift.io"], Resources:["templates"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["buildlogs"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:["build.openshift.io"], Resources:["buildlogs"], Verbs:["watch"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["get"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["list"]}.
Info: clusterrole/view has extra permission PolicyRule{APIGroups:[""], Resources:["resourcequotausages"], Verbs:["watch"]}.
[Note] Running diagnostic: ClusterRouter
Description: Check there is a working router
WARN: [DClu2001 from diagnostic ClusterRouter@openshift/origin/pkg/oc/admin/diagnostics/diagnostics/cluster/router.go:135]
There is no "router" DeploymentConfig. The router may have been named
something different, in which case this warning may be ignored.
A router is not strictly required; however it is needed for accessing
pods from external networks and its absence likely indicates an incomplete
installation of the cluster.
Use the 'oc adm router' command to create a router.
[Note] Running diagnostic: MasterNode
Description: Check if master is also running node (for Open vSwitch)
Info: Found a node with same IP as master: c1-ocp
[Note] Skipping diagnostic: MetricsApiProxy
Description: Check the integrated heapster metrics can be reached via the API proxy
Because: The heapster service does not exist in the openshift-infra project at this time,
so it is not available for the Horizontal Pod Autoscaler to use as a source of metrics.
[Note] Running diagnostic: NetworkCheck
Description: Create a pod on all schedulable nodes and run network diagnostics from the application standpoint
Info: Skipping network diagnostics check. Reason: Not using openshift network plugin.
[Note] Running diagnostic: NodeDefinitions
Description: Check node records on master
[Note] Running diagnostic: RouteCertificateValidation
Description: Check all route certificates for certificates that might be rejected by extended validation.
[Note] Skipping diagnostic: ServiceExternalIPs
Description: Check for existing services with ExternalIPs that are disallowed by master config
Because: No master config file was detected
[Note] Summary of diagnostics execution (version v3.10.0+dd10d17):
[Note] Warnings seen: 3
[Note] Errors seen: 1
@openshift/sig-user-interface
Install OKD "All-in-One Server" using below links
https://docs.okd.io/latest/getting_started/administrators.html#downloading-the-binary
@openshift/sig-master Is this method of running OpenShift still supported?
@imranrazakhan I'd recommend using oc cluster up or running an Ansible install, which will set up the web console for you.
@spadgett Thanks for updates, Yes i will try to use recommended approach but i want to know reason why websonsole was not working?
As per my understanding binary installation doesn't deploy webconsole so i did following step to install it, Please correct me if my understanding is wrong
Following are steps to install websonsole (Confirm if this is correct way)
Clone the openshift origin repo
git clone https://github.com/openshift/origin.git
Update the origin/install/origin-web-console/console-config.yaml file , with correct IP details.
Execute following steps
$ oc login -u system:admin
$ oc create namespace openshift-web-console
$ oc process -f origin/install/origin-web-console/console-template.yaml -p
"API_SERVER_CONFIG=$(cat origin/install/origin-web-console/console-config.yaml)" | oc
apply -n openshift-web-console -f -
Now you can access web console at https://
Yes i will try to use recommended approach but i want to know reason why websonsole was not working?
Simply that openshift start doesn't do anything to install the console. (It seems the docs are out of date.)
What you've done looks right.
Issues go stale after 90d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.
Exclude this issue from closing by commenting /lifecycle frozen.
If this issue is safe to close now please do so with /close.
/lifecycle stale
Stale issues rot after 30d of inactivity.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.
Exclude this issue from closing by commenting /lifecycle frozen.
If this issue is safe to close now please do so with /close.
/lifecycle rotten
/remove-lifecycle stale
Rotten issues close after 30d of inactivity.
Reopen the issue by commenting /reopen.
Mark the issue as fresh by commenting /remove-lifecycle rotten.
Exclude this issue from closing again by commenting /lifecycle frozen.
/close
@openshift-bot: Closing this issue.
In response to this:
Rotten issues close after 30d of inactivity.
Reopen the issue by commenting
/reopen.
Mark the issue as fresh by commenting/remove-lifecycle rotten.
Exclude this issue from closing again by commenting/lifecycle frozen./close
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.
Most helpful comment
@spadgett Thanks for updates, Yes i will try to use recommended approach but i want to know reason why websonsole was not working?
As per my understanding binary installation doesn't deploy webconsole so i did following step to install it, Please correct me if my understanding is wrong
Following are steps to install websonsole (Confirm if this is correct way)
Clone the openshift origin repo
git clone https://github.com/openshift/origin.gitUpdate the origin/install/origin-web-console/console-config.yaml file , with correct IP details.
Execute following steps
Now you can access web console at https://:8443/console