--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T11:38:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9bd42750-7b2f-4469-8d84-f8fc0c4f9989"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:53Z" name: builder-dockercfg-8vmgd namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9bd42750-7b2f-4469-8d84-f8fc0c4f9989 resourceVersion: "3460" uid: bff193cd-4df4-4a3c-9f61-cc71e6252ab9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T11:38:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a28b5c4f-c81a-4487-99df-9e2c2c2602cf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:49Z" name: default-dockercfg-g5lml namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a28b5c4f-c81a-4487-99df-9e2c2c2602cf resourceVersion: "2968" uid: 1e5f5b1e-6aad-4c7e-98d3-3bac81102672 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T11:38:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f252bda3-caba-4695-8e61-1f3105c4ee72"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:53Z" name: deployer-dockercfg-xn588 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f252bda3-caba-4695-8e61-1f3105c4ee72 resourceVersion: "3461" uid: b2fd0d22-e38c-4213-98f7-0ed1f2cc18b8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-20T11:38:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"10a278f1-a7d1-4da4-ae15-446b61b30fbe"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:49Z" name: gather-dockercfg-t6gsr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 10a278f1-a7d1-4da4-ae15-446b61b30fbe resourceVersion: "2977" uid: e4e05c6f-a6ba-4312-88f8-1e883efb99a8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-20T11:38:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"52c80f10-6c5c-4417-8205-b62647eb7af9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:49Z" name: insights-runtime-extractor-sa-dockercfg-rffgp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 52c80f10-6c5c-4417-8205-b62647eb7af9 resourceVersion: "2982" uid: 0c759a7e-040e-438d-ac76-dcc09259eac8 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T11:43:13Z" service.beta.openshift.io/expiry: "2028-04-19T11:43:13Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 00748ea3-cde6-4135-8654-34608092429c creationTimestamp: "2026-04-20T11:43:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"00748ea3-cde6-4135-8654-34608092429c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T11:43:13Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 00748ea3-cde6-4135-8654-34608092429c resourceVersion: "8124" uid: cd6ceae2-921a-4b74-b4b9-6059b48b6fa6 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T11:42:45Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 47c83908-aa4b-470c-99a5-19bee0d1800c service.beta.openshift.io/expiry: "2028-04-19T11:42:45Z" creationTimestamp: "2026-04-20T11:42:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"47c83908-aa4b-470c-99a5-19bee0d1800c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T11:42:46Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 47c83908-aa4b-470c-99a5-19bee0d1800c resourceVersion: "6972" uid: b94608be-b3b3-4625-8f30-f1d9370e15de type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-20T11:38:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T11:38:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f05169e-de36-44e3-8b15-f1ac64d82bed"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T11:38:49Z" name: operator-dockercfg-fj8qj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 9f05169e-de36-44e3-8b15-f1ac64d82bed resourceVersion: "2983" uid: 94219ad9-29d9-42aa-848c-1ba37f2c149b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "10856"