--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T10:00:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d5410ec1-6783-4cad-a4a0-9d7823f4f866"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:09Z" name: builder-dockercfg-kmsbk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d5410ec1-6783-4cad-a4a0-9d7823f4f866 resourceVersion: "26336" uid: c2bcfe9e-22a3-4064-a834-65632edd5298 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T10:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"601e8766-4c57-4fd9-838e-4f8e9eee7e5f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:05Z" name: default-dockercfg-4rb5l namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 601e8766-4c57-4fd9-838e-4f8e9eee7e5f resourceVersion: "26213" uid: 61e9f478-5f9a-4c93-bfd2-ba1fe6639b82 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T10:00:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a4ed04d5-568e-4814-b69d-c0a1bb9313cb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:09Z" name: deployer-dockercfg-9wr5x namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a4ed04d5-568e-4814-b69d-c0a1bb9313cb resourceVersion: "26339" uid: 5a96a5eb-4d11-4d96-8771-4f1b0288fb79 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-21T10:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6eff4f80-a182-4e74-b499-fac9c6830674"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:05Z" name: gather-dockercfg-jgl5r namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 6eff4f80-a182-4e74-b499-fac9c6830674 resourceVersion: "26212" uid: fbb3f5a9-f8c6-4990-a26a-0ef8e11f8386 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-21T10:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ef4078ca-5c7e-400d-b0ad-d0f71e8ac6b5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:05Z" name: insights-runtime-extractor-sa-dockercfg-l8m2h namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: ef4078ca-5c7e-400d-b0ad-d0f71e8ac6b5 resourceVersion: "26214" uid: b819dba8-f486-4041-8cb0-56521c8b8069 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T10:04:34Z" service.beta.openshift.io/expiry: "2028-04-20T10:04:34Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 06428c23-121c-4053-b598-530e10674af1 creationTimestamp: "2026-04-21T10:04:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"06428c23-121c-4053-b598-530e10674af1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T10:04:34Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 06428c23-121c-4053-b598-530e10674af1 resourceVersion: "7328" uid: 44d32e8f-7976-4226-9bc1-79b073dc2ec8 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJZkRFaERxQ014RWN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzJOVGcxT1RBZQpGdzB5TmpBME1qRXhNREEwTWpaYUZ3MHlPREEwTWpBeE1EQTBNamRhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQU9lRnhGdzVENTI3M1ZvRU5YWVhZNTdKaWs3ejczR0RLb0xvUUIwbGdYYXF5QTh3NlBXcgpnc3Zpd1RnQkdnR0FUK2hMQVFWQUt3MUtFRDFYTEhNSnA4M2pzeC9UYlpBbmhrSVMwa1ZEVGY0ZHhaeDgxb1NWCmlBamNrQkZLVGVkWkkvSUlQOTQydEprTXlQOUdxZDdlSzV4dGwzSXBlTndSeE9MRHFyb2dqYVZVeVUxZmYreXMKNHUwV1NPVTZOVnU4eE1VaVdFeUxlMDJSTUFDNzZBWlN0eHZmZ0JJdlhVSFRyUzBjWm1jTnp1bGMxMzNaM2pwMwpXeWprakhjdzNZYUpJLzErTUd5c3JlUVVSc29mVEFJNlVWNUwyekNEMUU1M1VKY2xjbFhJTkFVa3k2UjR3ZDYrCmlBdXhISWw1NUF6Qld0cEJsN1F4QlZIWmVOVlBod1BpSTVNQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJTZFk3NGRGNnNNaTVSditqNlFSeTYwenZPVzN6QWZCZ05WSFNNRUdEQVdnQlNDczBRMXlqN1RhRmoxCjdSSis5OS9RSzBBSXd6QlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkdJd05tUXhaR0ZpTFdGbU1qY3ROR1pqTUMxaU56ZzJMVFUwCk5tUTBOR1F4TWpGbFpEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFrd2lOVXJGT09xUmJvS2hQS0xjUGc1bHMKVjZDYWNTRzJmVmV1U3lOeDY3NVl6c1IrcmI1QUpIUXlqYjJxUlBvNFlMSnZZRmVWSHlPcXY4R0FHYno0NDZ4bQowelFLUFBYeGYxdTVSNE9ORndIdmlRTkVZTHdxTWFDR0JPMjhCdUsvbHYxZVdwVlpES0JkZEVGdytIdUVYMFRHCmZBM2hUK09xcWI2ekc0ek1xYS9zZmo0SnVsZUwzQ3kvTGpiREZYSEZ0RG5URHhHOVFMOVZwZkU5MFR5NU1mdGMKdWRmY0NaODJWOWU1Qm9nc1RMZ1h1MjZLb21Nc1NoYTdHeGZITTNBbHM5RFpXWFVsczh5cGErcnU1c1dobi9tLwp2TlZ3c3ZLdXkvalJuRXpraWc2VjNTMUlyL256RFhNYS96WUgxaHNwRHlTVkJiWG5jd01PLy85VERBQWlqUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJWmJqdit5RHhvaWN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzJOVGcxT1RBZQpGdzB5TmpBME1qRXhNREEwTVRsYUZ3MHlPREEyTVRreE1EQTBNakJhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelkzTmpVNE5Ua3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ2ppSkkrYmFtUXhrNFV5aEFwZi8xSVVDMEFnelhwM2d3TAp4dUNQQUYxNDhubnFzMnQ2bUI2TS9XcHNsZmtNOXZlUGRCU1NXQjczTk1zMjRJTFphWmUvMWtYZlUwVk9ScGdVCjlhb0xJV2ZlUkdQRkNNWlAzM1ZQTzN5TlRWRDlqbHRXVDlYRXBVUTBFTVRwOWRFRDdRV0NTWjVyVmE1bkt5SlUKWDc5ZGg0bVFCb2pKVmdFRjVid05xWHNBRERuSzdqeGtDTTBrY3pZVkdMOGpOTzN5Y1hCOGlxa1BtTGdUNHFLZgpOSXFMVjcvSUNralY4MTlYald6NS9ueGhRemFMeG91SlBDU1NGcEQxNS9LWXZDREo4VXREQ0xFTitRaUJvTE10Cm9XS2o1U3hXUzU4MXNPelp0OG9Kc0RIeUhKelFlRWRwVWl6aEIxT2drTjNtQUt5RDhUT1RBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlNDczBRMQp5ajdUYUZqMTdSSis5OS9RSzBBSXd6QWZCZ05WSFNNRUdEQVdnQlNDczBRMXlqN1RhRmoxN1JKKzk5L1FLMEFJCnd6QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFvendjUS9IQnRzL0VZVGxOQU1hSEt4Rmd6SndITW9uaitqUHgKUmpsVjR4SjdxOVN4OFk1R1JUL21xVlRKVDJ0eFR1YlU2N1VsMnNMdXQ0VUROZTFZRTRQUVVvMXZYenJkRVdKYgoxWTNiS3BUWVVVNEFtOGNrd1NGcm5mWjVUZnI4MlJ5QVg5VzNVOFYxbXZOSHl0WmpCN3laSExSTENwWUdxNzI1CnI2aEhxbWZYblQ1emZUcURoUEVSNHhIR244bHlRaE1Sa0FiL2VsWUZuRVdYM3lBb0FnNEwxVDQxVmVmdDdOZ1AKQjZYbm5YUXZ1SUpEbFV6KzlnTjdaK1lHL2gzYkpQcDJtZ2M5ck1kRTBET0JMNXAxcFZLaGczWmJDYWRoZ3dRUApsQzVpRitERllmSjhsN3NFNUpJbXIrVEYxU1c1YmI4eGV4S21aNWgxTVE5aHRzY3hHZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T10:04:27Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: b06d1dab-af27-4fc0-b786-546d44d121ed service.beta.openshift.io/expiry: "2028-04-20T10:04:27Z" creationTimestamp: "2026-04-21T10:04:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"b06d1dab-af27-4fc0-b786-546d44d121ed"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T10:04:27Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: b06d1dab-af27-4fc0-b786-546d44d121ed resourceVersion: "7204" uid: 086d16a2-ab20-408a-a355-38e5a3ab5fad type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-21T10:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c0a91c7-0908-42d2-8df8-a84867902579"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T10:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T10:36:05Z" name: operator-dockercfg-g7zxg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 8c0a91c7-0908-42d2-8df8-a84867902579 resourceVersion: "26229" uid: fba9eadc-4fe1-48fd-8369-2d5d8e2856df type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33104"