--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T19:03:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80de65db-13a1-43f0-a3c6-74aefe0fbb42"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:39:51Z" name: builder-dockercfg-xcxsr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 80de65db-13a1-43f0-a3c6-74aefe0fbb42 resourceVersion: "25356" uid: 060d3abd-357a-4fbf-a779-684e052b12df type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T19:03:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"99262e29-ba1b-4413-be4a-7c8a06a11f7b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:39:49Z" name: default-dockercfg-7njj4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 99262e29-ba1b-4413-be4a-7c8a06a11f7b resourceVersion: "25127" uid: 426547b8-1c45-4524-93b8-e17431329d3f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T19:03:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a4c39d33-3711-45a4-84f3-678c038faca8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:39:51Z" name: deployer-dockercfg-tb7dh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a4c39d33-3711-45a4-84f3-678c038faca8 resourceVersion: "25367" uid: e2e51300-bd2a-4814-8f3d-68680a5cbe74 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-24T19:03:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b71cf3f5-a1bd-4293-9baa-8c405b6eebeb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:39:49Z" name: gather-dockercfg-hlk4x namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: b71cf3f5-a1bd-4293-9baa-8c405b6eebeb resourceVersion: "25203" uid: 6f312f04-3a42-4bf2-9acb-2bade3c8f0c7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-24T19:03:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"38643e9b-37eb-420b-8087-61515f7c09f4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:39:49Z" name: insights-runtime-extractor-sa-dockercfg-fsgkc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 38643e9b-37eb-420b-8087-61515f7c09f4 resourceVersion: "25209" uid: 928aada2-8a1b-4b2a-a0a0-ddab4ad4f207 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJRWdIUm1YS0dXZm93RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTFOemMyTVRBZQpGdzB5TmpBME1qUXhPVEE1TXpOYUZ3MHlPREEwTWpNeE9UQTVNelJhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFOc2xxSWc1a1hWR3Vza1ord3Y0ZUJaWjdpbTJHRjJmS01DcjRWT3JoMU40UnpZRgpEZkpaeVNuU2w5bzFwUU1WMzA2Qk51dW40bVdyYXRQMDFpbWxtZXNsOWxnOFBpQkgyYnZNMHpzZDB0d2t5ZHNHCkdQZUlHdml5TkZlZ2xOR1FPSWxWVktUMUorNjZwaGwzK1pzSFRVY1pJNk9ycjBlRmp4bEFYaUI1SzRtV2ZzYi8KYXpVOFNkY2xDTEE5YnA0S281Vm1xZUQ3MmNKNFV5enhTT0Noc05YOFQ3ZTdEUmN1NFJLenI3dUZwdEVUZHhyQQo4K1RZYXlaR1I4cU5CcmZsMkUycWRxcHJEa09MZHQwZ1BTUzQxeUR3UTRhQW1qUTN3bVhmYjBJQjVaSGtRWlBUClhCTjBUR08yZ1BWZ0E5WEZtQWxjMlZJWjhsbm9tNzRJRVZsNmV2TUNBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCUVUrU29WbVUweU9UeHZjY2UwSUwvME9KVElRREFmQmdOVkhTTUVHREFXZ0JTT2g0TTFGVEFZCjMzT2licGNQOWxjU2wzbHY1RENCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rTlRrNE5HSmtaRE10Tm1JMk55MDBPVEE1TFRrMk9ETXROV0ptT0RsagpZV0kwTW1VMU1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQWdHY0VsUlNkenBrM2d5MVZ1RGdCbnFRMmgxclZSCnh6VnJuZ0dnck1NSkdQcHp1eEUycmFOWWpEcHozTmttRENVenBzR2VzbnhIRktCTXpBR0g1WXNkYWU2b0ZROWUKbjdhajBXaVFBTDdIcU5DZnJVVVRhZmF3dVVkaWxCOTVVd0Q2end0aUFHQWV4dlBFNDRuekFiWmlLc3VYU3NGSwpaaDhDNFZUUFNQS01Ga2VqczAxeVJvczFvdXZQdEkxRm9ibmRjbzcxSVFuNDd2d1hBL01COEd2Z2xnWlp4Q1Q4CjU1UWJiM0liMGUyNnpxKzJjbzM0Z0dDWFBtZFB4b3VhUHZsYThOeFd6L0RnelNIbXJBeE5HMHRjUUVaTXU5ZzMKQmt0MDZVUTBHcmd5OFdTclR3ejl5K0JQNUlMd0JSQ2NkbXZRZEJrY3RsSHRCaFUwQm40bWtoenIKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlJMkdqdGtxdU1zZ3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpBMU56YzJNVEFlCkZ3MHlOakEwTWpReE9UQTVNakJhRncweU9EQTJNakl4T1RBNU1qRmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Y3dOVGMzTmpFd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDNU4zSXJCTm9RQ2h0Y291VGpKbC9MRWE1b1V3NTNCRGI3CjhBRGZ6eXlvMkl5MFljSkRkSGJheTQ2UHZVRVVvQ1VHUlVrc0FHd3FxNUZqby9ITVRhaVJxSTVqcklsZGlSN0MKVlhldTJWb2hzVkVHNDBUcG1pVmZ3ZUNpVE1YUi80TXh2dTcvTG5rZS9mWTlqby8vQ0xrMFpZcFFCZHpkT0ErVgovMFliUmE4dWdDaWVsc05KYjJ0WGhzNDlYVVdmZUo0RmxkbTJ5RE5ySFFRU0l6WUx5SjUrMTFBM1pKRnU3dWhSCkdjNmJOMUo2SEx4Yk5zdmp0V3hUVGtUcG1Hd3lSbUdtbDBMb2tGOEl0WkFIV2FUeUdvdDNxU1VQQ2FrQWxJdkMKQ1ZNbmR2SURjY1FzL2FXeHRNb0JQT0JWKy9uNFMxdGVZdENMejdnakFRdlEyMllzTHFvekFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU09oNE0xCkZUQVkzM09pYnBjUDlsY1NsM2x2NURBZkJnTlZIU01FR0RBV2dCU09oNE0xRlRBWTMzT2licGNQOWxjU2wzbHYKNURBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQXJrWGNHTUgzOCsva1JoR2pBdkdxeXlsZ1J3R3Z3UDJKN3lKMwphV2QrTW9Oc3VSbTJNd2ZPUUI2bDQvL3Y4NmNYMEprUW5YNVBPVld6NDhrUU5pVGpDWUpvQitxc3M5R256SmVTCndBaW4vejdJNmQrSUN1dnBZaGFHb0ErUnhOa3doQ1hkR3g0ViszMVVudjAzOFUya1Y0RzlqdmVpZ0dNY2MvM2EKbVBDcE4wWW45VkpucHVQWXh3VUZEWitBQ0lITHVhMmVRTGZnNERIc09XYkVSc0Y3cExDMUhlSlRYT0VRMmV1NApZeGtXL1oyQ2lCWitXRDBjckJaQkRDdWQ1dlhCU0JXTGhNdER0alVBVXlQWXUyRy9rRzRxTVR3ZDNrd1BkaHJVCkw4Y0FLQjRUNy9KNm55ekFJVU9IWnNCNGZibkxFOW9RSXU2NFZQODYwQ0RPTzNvdlVnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T19:09:34Z" service.beta.openshift.io/expiry: "2028-04-23T19:09:34Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 5984bdd3-6b67-4909-9683-5bf89cab42e5 creationTimestamp: "2026-04-24T19:09:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5984bdd3-6b67-4909-9683-5bf89cab42e5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T19:09:34Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 5984bdd3-6b67-4909-9683-5bf89cab42e5 resourceVersion: "7856" uid: 23ea531f-50ab-429c-a1cb-6835fbabcde4 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJVVZTYmhTeFFJbGd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTFOemMyTVRBZQpGdzB5TmpBME1qUXhPVEE1TWpkYUZ3MHlPREEwTWpNeE9UQTVNamhhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQU1VT0RkNHJIRjNjd0h4TmZNOUx1V0x3SHM1UHFIaWhldThwVWNQejh1MkwwTjlQZnRPcQpXSndCRjcxQUc4UlpUNWRISWsxR3dpL3YvUWpnUGVnbHFDdld1Y1Y2RG5QNlFZL3NxUXhleWxoSTluTjJPQjFmCm5QdE9RTTIySXl6SHhZSlZLNStKc2dqN25kRVBVMVpBWWVReUJDaFhRM0VXTzExM0xVNEhCbVVMUXZDYTdSRlkKQzFGbm1EbDVaaFdJUytWd0xEa3VyeXVINDd1dHpySTl3QWgySU55L3U4VklYbmc4aTU3UDlLRUtQbTJ3eUFPUQppREsrNWRDMnR1MFU0emJ4Qnl5NEhtem04TDlnam0xOEdTY25SQm9hM3ppWmNpOXV5Tytzd3RhQVUyaEMybkJtCjJtUDRuc0tpbThxbkhzN1d0MmtjMjdxTzl1OFdSRC9HZEtrQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJTN0xucXdQYTVHVjJRcmc2RityMFhTeXI5QkRUQWZCZ05WSFNNRUdEQVdnQlNPaDRNMUZUQVkzM09pCmJwY1A5bGNTbDNsdjVEQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkdRME5HSTFNMlE0TFRBNFpXWXROR1ZtWXkwNVltUTVMVGhpCllUazBORFUxWVdSa09EQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFjN01uc2pqcDI3a0JIdW04OVdoRkdTaGIKQjF6dlBZZzhsYkhBdkdabzR0eDRraWtiMjEwaHA1M2Y2Z0VPeGs5bklvTXdEcXI1dkVWdFRVNVNpdDRWaG9YMApFMGRFNnZNaFFkYVdFaXltd1IvMm1PTjErNFcyWEJuMEFkdFRtWGgramlCSEpTTWFzaDdyOGxYSHEwd3dRMTkzCkc0anJnbzNUU3FxWHdoTi9JR0pPYS9sTUpsdGl2RFB4VXYyQk1xcFowL1QrR2dZNkw5YzRYSmcwcDZCVmVhejcKVXFobVIrMTB2aEZYTUZhU1NDVDAxUTl5KzFuTk1OaTgxekpmSEM0QXUzMGU3K1d1YldBNXY0V1NLNm01aFhrNgozaTJySU9uZmJQblphQVlEdUY2VHZhNkhvdG50SHBobUJnUjlJc0lDNmhxMkNBemNPc3lVeHBXdnJOZDlkZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJSTJHanRrcXVNc2d3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTFOemMyTVRBZQpGdzB5TmpBME1qUXhPVEE1TWpCYUZ3MHlPREEyTWpJeE9UQTVNakZhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOemN3TlRjM05qRXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzVOM0lyQk5vUUNodGNvdVRqSmwvTEVhNW9VdzUzQkRiNwo4QURmenl5bzJJeTBZY0pEZEhiYXk0NlB2VUVVb0NVR1JVa3NBR3dxcTVGam8vSE1UYWlScUk1anJJbGRpUjdDClZYZXUyVm9oc1ZFRzQwVHBtaVZmd2VDaVRNWFIvNE14dnU3L0xua2UvZlk5am8vL0NMazBaWXBRQmR6ZE9BK1YKLzBZYlJhOHVnQ2llbHNOSmIydFhoczQ5WFVXZmVKNEZsZG0yeUROckhRUVNJellMeUo1KzExQTNaSkZ1N3VoUgpHYzZiTjFKNkhMeGJOc3ZqdFd4VFRrVHBtR3d5Um1HbWwwTG9rRjhJdFpBSFdhVHlHb3QzcVNVUENha0FsSXZDCkNWTW5kdklEY2NRcy9hV3h0TW9CUE9CVisvbjRTMXRlWXRDTHo3Z2pBUXZRMjJZc0xxb3pBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlNPaDRNMQpGVEFZMzNPaWJwY1A5bGNTbDNsdjVEQWZCZ05WSFNNRUdEQVdnQlNPaDRNMUZUQVkzM09pYnBjUDlsY1NsM2x2CjVEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFya1hjR01IMzgrL2tSaEdqQXZHcXl5bGdSd0d2d1AySjd5SjMKYVdkK01vTnN1Um0yTXdmT1FCNmw0Ly92ODZjWDBKa1FuWDVQT1ZXejQ4a1FOaVRqQ1lKb0IrcXNzOUduekplUwp3QWluL3o3STZkK0lDdXZwWWhhR29BK1J4Tmt3aENYZEd4NFYrMzFVbnYwMzhVMmtWNEc5anZlaWdHTWNjLzNhCm1QQ3BOMFluOVZKbnB1UFl4d1VGRForQUNJSEx1YTJlUUxmZzRESHNPV2JFUnNGN3BMQzFIZUpUWE9FUTJldTQKWXhrVy9aMkNpQlorV0QwY3JCWkJEQ3VkNXZYQlNCV0xoTXREdGpVQVV5UFl1Mkcva0c0cU1Ud2Qza3dQZGhyVQpMOGNBS0I0VDcvSjZueXpBSVVPSFpzQjRmYm5MRTlvUUl1NjRWUDg2MENET08zb3ZVZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T19:09:28Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: d44b53d8-08ef-4efc-9bd9-8ba94455add8 service.beta.openshift.io/expiry: "2028-04-23T19:09:28Z" creationTimestamp: "2026-04-24T19:09:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d44b53d8-08ef-4efc-9bd9-8ba94455add8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T19:09:29Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: d44b53d8-08ef-4efc-9bd9-8ba94455add8 resourceVersion: "7722" uid: c4e3fa61-a285-4561-820a-9a48d5c01f6a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-24T19:03:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ded38ef8-3cbe-4001-8e40-4479d2554677"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T19:03:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T19:39:49Z" name: operator-dockercfg-5xcbr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: ded38ef8-3cbe-4001-8e40-4479d2554677 resourceVersion: "25123" uid: 88bd458f-02b3-46b1-a090-c18d4c5f9604 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42808"