--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:49:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d7904df6-d484-4c2b-9498-f89085336f83"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:32Z" name: builder-dockercfg-pcfq2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d7904df6-d484-4c2b-9498-f89085336f83 resourceVersion: "24686" uid: e1d8f44f-3678-4fbf-ab06-b5d1fde7d500 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:49:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"41081cbe-e67d-4094-9ed1-872bca841a9b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:27Z" name: default-dockercfg-jw24x namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 41081cbe-e67d-4094-9ed1-872bca841a9b resourceVersion: "24529" uid: a7daeb6a-e665-495d-b34f-23daeb249934 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:49:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"478467ff-6e68-4e5f-b2b4-c48654c6ab7a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:32Z" name: deployer-dockercfg-2fhrp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 478467ff-6e68-4e5f-b2b4-c48654c6ab7a resourceVersion: "24697" uid: acfd1810-68ff-4cf4-b3d9-aaaf804bc045 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T14:49:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"affd27ef-411d-4903-9c22-d30fd6e0a2f1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:27Z" name: gather-dockercfg-qjjdc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: affd27ef-411d-4903-9c22-d30fd6e0a2f1 resourceVersion: "24548" uid: bf2ebaca-1c23-4fcd-af50-f6afc0ba2f2e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T14:49:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0beb3ac5-5926-4f9f-91ab-03260601d804"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:27Z" name: insights-runtime-extractor-sa-dockercfg-bg2mj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 0beb3ac5-5926-4f9f-91ab-03260601d804 resourceVersion: "24538" uid: 489328b8-a41d-4376-b42b-ddd375c54324 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:55:03Z" service.beta.openshift.io/expiry: "2028-04-15T14:55:03Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 2786a645-0256-46d0-a337-6e244929fca3 creationTimestamp: "2026-04-16T14:55:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2786a645-0256-46d0-a337-6e244929fca3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:55:04Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 2786a645-0256-46d0-a337-6e244929fca3 resourceVersion: "7837" uid: 966da06d-82f7-4113-a1f9-77da4905cd88 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:54:58Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: c9b05cc4-de30-4491-bad8-42b85fce8dab service.beta.openshift.io/expiry: "2028-04-15T14:54:58Z" creationTimestamp: "2026-04-16T14:54:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"c9b05cc4-de30-4491-bad8-42b85fce8dab"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:54:59Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: c9b05cc4-de30-4491-bad8-42b85fce8dab resourceVersion: "7752" uid: 2f0aaff7-746d-4d4a-b410-803dcd0752b6 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T14:49:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"75b353ab-2069-4e62-9a00-13c7a696ea89"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:27Z" name: operator-dockercfg-b5dxd namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 75b353ab-2069-4e62-9a00-13c7a696ea89 resourceVersion: "24526" uid: a60b4d56-c2fa-4bc4-a663-5ee790f0a248 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33920"