--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:26:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"922bd1a0-5938-48d0-9f5c-52e07651b14b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:42Z" name: builder-dockercfg-wqwrk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 922bd1a0-5938-48d0-9f5c-52e07651b14b resourceVersion: "3277" uid: af0b4c67-1b72-450c-b840-95051bfb41d3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:26:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cab3cabb-e4f3-48ab-8f66-2273ae06c43b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:38Z" name: default-dockercfg-prvr9 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: cab3cabb-e4f3-48ab-8f66-2273ae06c43b resourceVersion: "2758" uid: 73aa0f6d-e90c-4899-ab57-dbae56970ca0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:26:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"55329e0f-eaf7-44b9-9a7f-95eb61f612b7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:42Z" name: deployer-dockercfg-qjmhf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 55329e0f-eaf7-44b9-9a7f-95eb61f612b7 resourceVersion: "3279" uid: faa51a6c-c981-4ac7-a5e0-ca568415798a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T18:26:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8dbd206b-1f8f-4bb4-a294-8c74f05c7e42"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:38Z" name: gather-dockercfg-jq6cs namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 8dbd206b-1f8f-4bb4-a294-8c74f05c7e42 resourceVersion: "2767" uid: 89eecf0d-5d89-4a26-a86a-f94514b584b6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T18:26:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5fac95aa-27bf-4c81-b221-2b6766c94f99"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:38Z" name: insights-runtime-extractor-sa-dockercfg-ppqlw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 5fac95aa-27bf-4c81-b221-2b6766c94f99 resourceVersion: "2771" uid: 6af6c597-3028-4603-ac00-9d1f4d9bd5a7 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:32:49Z" service.beta.openshift.io/expiry: "2028-04-15T18:32:49Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: e0418fc7-d32b-4f2a-97e6-4ab6b3fb7f31 creationTimestamp: "2026-04-16T18:32:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e0418fc7-d32b-4f2a-97e6-4ab6b3fb7f31"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:32:50Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: e0418fc7-d32b-4f2a-97e6-4ab6b3fb7f31 resourceVersion: "7953" uid: d3422518-0f97-42b9-a292-dcee01a2f0d2 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:32:45Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 4e45aedf-c050-407d-99da-428113800e6c service.beta.openshift.io/expiry: "2028-04-15T18:32:45Z" creationTimestamp: "2026-04-16T18:32:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"4e45aedf-c050-407d-99da-428113800e6c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:32:45Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 4e45aedf-c050-407d-99da-428113800e6c resourceVersion: "7860" uid: 06570e76-57c2-4c59-8497-0fbe56d77d68 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T18:26:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7e124452-b907-48ba-ad73-ffc47ee027d8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:26:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:26:38Z" name: operator-dockercfg-m2k52 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 7e124452-b907-48ba-ad73-ffc47ee027d8 resourceVersion: "2773" uid: d30a35dc-f75f-4256-b52e-ceb84392da95 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21650"