--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T17:31:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6fa6d4f6-58f9-4da2-a5be-1a3a34ac093a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:35Z" name: builder-dockercfg-578g8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6fa6d4f6-58f9-4da2-a5be-1a3a34ac093a resourceVersion: "38463" uid: 3ef2c8b1-fcc1-4892-b940-7694d4420557 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T17:31:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8435b65-6041-4396-b8ad-996d8d4983fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:31Z" name: default-dockercfg-24dnb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d8435b65-6041-4396-b8ad-996d8d4983fd resourceVersion: "38329" uid: 88c74037-aff5-4736-b5ae-1c6506c4536f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T17:31:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e606cb2a-7cb6-4d1d-a92c-36bf9f8ae8e6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:35Z" name: deployer-dockercfg-mq5k5 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e606cb2a-7cb6-4d1d-a92c-36bf9f8ae8e6 resourceVersion: "38472" uid: 962ec072-79ef-4eaf-bbf5-e591b44233f0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T17:31:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"01fbd615-1b35-49b2-ab3a-82a7aad846d9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:31Z" name: gather-dockercfg-9qmdq namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 01fbd615-1b35-49b2-ab3a-82a7aad846d9 resourceVersion: "38309" uid: e01ca6eb-066e-43bf-8f8c-a839967d1341 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T17:31:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"54b23b2e-f6b0-4034-82ef-7695d1aad440"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:31Z" name: insights-runtime-extractor-sa-dockercfg-tt9tl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 54b23b2e-f6b0-4034-82ef-7695d1aad440 resourceVersion: "38314" uid: 3ada40c2-a8a4-4354-8263-2c4a0bd257f2 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T17:37:32Z" service.beta.openshift.io/expiry: "2028-04-21T17:37:32Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 30c3b0e1-7957-470d-b797-8c65b53d17dc creationTimestamp: "2026-04-22T17:37:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"30c3b0e1-7957-470d-b797-8c65b53d17dc"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T17:37:32Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 30c3b0e1-7957-470d-b797-8c65b53d17dc resourceVersion: "7926" uid: 22766c22-c0b6-4acc-bb25-5f93440c345c type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T17:37:26Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 2fe79f13-6bd7-4b81-b270-386b527e18f8 service.beta.openshift.io/expiry: "2028-04-21T17:37:26Z" creationTimestamp: "2026-04-22T17:37:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"2fe79f13-6bd7-4b81-b270-386b527e18f8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T17:37:27Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 2fe79f13-6bd7-4b81-b270-386b527e18f8 resourceVersion: "7810" uid: aeece2a7-a3d1-41ad-8d55-618bffe47c89 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T17:31:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"533e812f-a757-4588-9d29-28541f021e72"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T17:31:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T18:43:31Z" name: operator-dockercfg-4jgk4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 533e812f-a757-4588-9d29-28541f021e72 resourceVersion: "38307" uid: 2837bc20-2979-4db8-8e19-56f0c70ecec3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38976"