--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:49:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"02739605-12a9-4dc3-a5fa-bc4e747f9df8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:35Z" name: builder-dockercfg-lzbk7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 02739605-12a9-4dc3-a5fa-bc4e747f9df8 resourceVersion: "38246" uid: 947cfe50-f570-4fae-9dca-58967c41f18c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"59ec744a-7d53-4320-9740-c3d9fdd1059e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:30Z" name: default-dockercfg-zlst4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 59ec744a-7d53-4320-9740-c3d9fdd1059e resourceVersion: "37935" uid: c242c434-426a-4996-9521-4c8313a8a246 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:49:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"01e1b3b4-6492-438b-a2c0-7ddb3644541d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:35Z" name: deployer-dockercfg-snmd5 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 01e1b3b4-6492-438b-a2c0-7ddb3644541d resourceVersion: "38255" uid: 57e815b7-c467-43ae-9411-d0956abd887a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"38780936-df08-4ea7-bb22-b5e5191d0121"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:30Z" name: gather-dockercfg-2n82p namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 38780936-df08-4ea7-bb22-b5e5191d0121 resourceVersion: "37944" uid: 41029994-23f7-459a-9c49-ee8a81f8a0d7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1da1ade7-8086-413f-a530-c35b635a7c3e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:30Z" name: insights-runtime-extractor-sa-dockercfg-2b2x9 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 1da1ade7-8086-413f-a530-c35b635a7c3e resourceVersion: "37941" uid: aafda72c-672b-46bd-89a6-0ca32e35ef7f type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJTU16VUoxZmhubmd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTFNVE13TmpBZQpGdzB5TmpBME1UWXhORFUxTVRKYUZ3MHlPREEwTVRVeE5EVTFNVE5hTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFNZGZ6cDVGVW5haXdtSGpjQlVUcXFnZVFBUldrbk1LZ2ZuMkJsY2cxZnc4Zk1FSwpPTXoxNytndUk4ZkZ1d0c0bHQ3VC9SenlUQnJiYURSR1dDZCszVFZlT29HbFJKbmNpeTZ0enl3L25ReStJaERSCnB0Mm5MeXR3R1l3ZzNxbzU1eXFnL0lpbFA1Q0VrdHBNTGNnM2NhRndHeXNFTG9FTzZYZlVkL3d2N2tSUHlOdnAKMGlBVVpzUmhrbGpiWVY1UHA1alRHM3R3QWt0R0FYRGxwYjNaNDVmR1pRdWgwaUpZZ1FCbmFqc1BhSTlMemJRWQpVN2RpLzgxWjNHcmI1anNTV3BCUlJBR1lPc01BOW8yNjJ3RHFHTmZrMDdMUCtCbGtDTHFTTU5ua3NVREF4a0VvCmF1ejJSOXRLT0MzKzdzaTdoNEI1SkwzeTNRL2lJdUNwWmUvb1Uva0NBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCUlZlWURiK3phU1ZxUXNuZXprZ0VjNWVQT0EvakFmQmdOVkhTTUVHREFXZ0JTdFA2aXFocW1qCkNjeTM5L1JHeEdtUjNDaXlERENCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rTTJJeVlXWXdaVEF0WXpJeFlTMDBOVFF4TFdFNU5tUXROekJsTkdabQpOVFUyWmpZNE1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQ0c4YXlhK1czZWZkMUphVmM2TkxzM0JMK1gzd0RNClUyVnZqSFZFVUtoUFRhSzRqVTZCZkZQdTQ4TlcxM0lLUzU5RnpHc1ExRTNqcmxGakxjOThLMmNIYjdZK2lBWFEKSlVrb0pIRlRYTVBlck5YMkc5M21LYk1sTmdaVHhNSXVqVUI2bGdYcHIxZXBkZXVkQVpqSHQrVFRJeWc5Z2FXNQpzWEJmMktEdEVZWjAxVzN3K3pBMmdMUWVRandIa00rdHpKQ05vRm94Mm4rNTBiL0FaczJ5YnRqQkxhVE5MUkRCClNWVkd1dTFlUXBib2FtcHZIY0thVzl2Uk1WU3BlMXc0dDQxWjdOeVBQQ05UcklvKzdxZE9zU2sxWWlZdXIzQlkKbDROQmpRUVNFKzlBM0xwaStHRlNtMmVMRm9Oem9Bd2ZsZXZSaWRiVUhiKzNieXlDcGR6eldONk0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlZcDB3MThYZC9Mb3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMU1UTXdOakFlCkZ3MHlOakEwTVRZeE5EVTFNRFZhRncweU9EQTJNVFF4TkRVMU1EWmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOVEV6TURZd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFET2h1VE51TnJnTWd3aHpjMGZ6YmxCa2hZRnZkTVJXN25ICndvV2t6R2dyVE05WEtNRGZxeWhOanh6Z00vMXB4OFI4c3ZyUDdIQksvVnJrbk9PMHUySXhkRDJXNUcwNmRmVzIKcjBCTWkyRXM3Zlg3YTgrN0JwVjZUVGJ5TVdZVk1LZXgwd1hJU0ZqUytBRnFaUENaaDNaL2hSZEFWR245RzJMOQpxT283N3FPeUtzbzNLYWhvQ0FPRlE5OFU3bUVvbVljQ3pPc3dUbm9NMWFIWmprOWhuYWxKdUpCU2dqTmZOdUVuCmVVa2k3azk3MnFNUmNraytJRFhYaWJWUHBPTmVLalNPNitBeWVSMFhjYzRPRWtHM0VObmoxSHVNRk9HQTZUb1IKWmJmRi9EVFV1eUswNFE0YzdFZzVGZzQ1amtrZWJxWmt5K1hTNXZTRGkwTVNIeUUrU0pJOUFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU3RQNmlxCmhxbWpDY3kzOS9SR3hHbVIzQ2l5RERBZkJnTlZIU01FR0RBV2dCU3RQNmlxaHFtakNjeTM5L1JHeEdtUjNDaXkKRERBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW5EallYODU0WWJycEdaeHNWNXB2Y0hLcE44RUdkR0I0cjR4ZQpWWThLamRiSUkxTXo1bStrdnRDdHVqWGdPZ2c0aHZvZWxqMC9aQ3VqSmVRWTJxWVJZOFRwZktXdUI3b1RzOTZBCjU0R3c5SVNLUWIrNUFLNjJlQTZmUU1XamlrRVl3RXNSOVpkQ2dxTjdiaWE1Z0VOckZHbVlJT1EyeGtUR1k2WGcKYzZucU1WRlNCYTJOOU5qWC8wcnJvRzd5VVkvOFpWc1VTd2ZwSDREbllJb0xOazlaQnJsSFU3RHgzNzlCbzNOVgpnK3BiUXpRTVlFeE9zUUNkNjBvc3hnWGdHT05BTTFESzJVcG5ldXZWUUJ6WUZtUHJWZ3dpYUhoaTQvVjZTelU2CmpNcTMxQ2tXTFl0VFhKcW1vSkVLUzVRN2UrVzg2QUZvV1Z5blk5WFVlUnJEY2oyVXZ3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:55:13Z" service.beta.openshift.io/expiry: "2028-04-15T14:55:13Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 3b2af0e0-c21a-4541-a96d-70e4ff556f68 creationTimestamp: "2026-04-16T14:55:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"3b2af0e0-c21a-4541-a96d-70e4ff556f68"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:55:14Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 3b2af0e0-c21a-4541-a96d-70e4ff556f68 resourceVersion: "7811" uid: b55ba84a-eab3-47c7-916a-e901b01c95a7 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:55:13Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: bbbb3a29-64a8-4ee4-9fd6-564244565825 service.beta.openshift.io/expiry: "2028-04-15T14:55:13Z" creationTimestamp: "2026-04-16T14:55:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"bbbb3a29-64a8-4ee4-9fd6-564244565825"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:55:14Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: bbbb3a29-64a8-4ee4-9fd6-564244565825 resourceVersion: "7821" uid: 91eb7d67-b8db-4932-9a12-d2866df7694a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T14:49:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2440491a-eca1-4308-a18a-7f201dd0b0d5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:49:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:25:30Z" name: operator-dockercfg-2hq7g namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 2440491a-eca1-4308-a18a-7f201dd0b0d5 resourceVersion: "37942" uid: 052e4f45-2844-45b5-b600-09a0cebb8337 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38914"