--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-28T19:13:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"86508cd0-7f92-44b8-bb44-f4e6e63821cb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:59Z" name: builder-dockercfg-wtwvf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 86508cd0-7f92-44b8-bb44-f4e6e63821cb resourceVersion: "25081" uid: b6bcb2db-549d-4630-887e-16ff62fedf3e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-28T19:13:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0cd4884c-0203-4aff-8034-eb6a2bf3864d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:54Z" name: default-dockercfg-r4zss namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0cd4884c-0203-4aff-8034-eb6a2bf3864d resourceVersion: "24903" uid: 0c2a0134-ff1c-4c79-9d14-4af6e4efe5d4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-28T19:13:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4b951dde-5f5f-4e7e-bc9b-a61e4a670b93"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:59Z" name: deployer-dockercfg-5ph4r namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4b951dde-5f5f-4e7e-bc9b-a61e4a670b93 resourceVersion: "25070" uid: ad8eda70-91fd-4cf2-954b-d3e12395365c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-28T19:13:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4c8773a4-0c84-44f5-98ce-9a4e4bf373f7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:54Z" name: gather-dockercfg-f2p9k namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 4c8773a4-0c84-44f5-98ce-9a4e4bf373f7 resourceVersion: "24918" uid: 77ecf3e3-cd60-4c09-a232-99e17051cb14 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-28T19:13:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"93e584f4-623d-4043-951f-ea7cc5273716"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:54Z" name: insights-runtime-extractor-sa-dockercfg-v5snm namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 93e584f4-623d-4043-951f-ea7cc5273716 resourceVersion: "24924" uid: 90725612-e8f1-479d-92a5-bb0d9902e1ce type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-27T19:19:10Z" service.beta.openshift.io/expiry: "2028-04-27T19:19:10Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: bc87fab9-2c3f-4d51-8eea-3c88d4fdbe07 creationTimestamp: "2026-04-28T19:19:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"bc87fab9-2c3f-4d51-8eea-3c88d4fdbe07"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-28T19:19:11Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: bc87fab9-2c3f-4d51-8eea-3c88d4fdbe07 resourceVersion: "7859" uid: 704701ae-ead9-4749-86fc-f17a5f3b775d type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-27T19:19:04Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 9ce6ffc6-b7f5-4dfb-96f2-c7ebc3cd6fab service.beta.openshift.io/expiry: "2028-04-27T19:19:04Z" creationTimestamp: "2026-04-28T19:19:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"9ce6ffc6-b7f5-4dfb-96f2-c7ebc3cd6fab"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-28T19:19:05Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 9ce6ffc6-b7f5-4dfb-96f2-c7ebc3cd6fab resourceVersion: "7746" uid: 2744d187-8753-4f2f-90df-a2b7961c002c type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-28T19:13:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"29f39df7-356b-43b8-ad07-d193993cc222"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-28T19:13:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-28T19:49:54Z" name: operator-dockercfg-wx6bw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 29f39df7-356b-43b8-ad07-d193993cc222 resourceVersion: "24912" uid: b4414712-02b1-4053-9e2f-4ec99879c136 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33907"