--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T20:01:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1d7c1700-a41b-4f99-89da-5c40d0fbd0fb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:42Z" name: builder-dockercfg-fj85b namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1d7c1700-a41b-4f99-89da-5c40d0fbd0fb resourceVersion: "25272" uid: 692d2940-8740-4ab7-927a-fa5891c292e8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T20:01:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3e6b52a3-3377-4d2b-9a93-67d2731fc7b1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:38Z" name: default-dockercfg-6vrd6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 3e6b52a3-3377-4d2b-9a93-67d2731fc7b1 resourceVersion: "25131" uid: a69bc5a6-3c00-4067-9de8-2b4b943899a2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T20:01:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ebf3e6a3-ab03-4153-a92a-77cc0e626c0d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:42Z" name: deployer-dockercfg-x642b namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ebf3e6a3-ab03-4153-a92a-77cc0e626c0d resourceVersion: "25263" uid: fb9d3122-4e47-4024-af18-f11396427b68 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-20T20:01:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"361c36d3-e50a-44bf-a437-dab7e2e1982d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:38Z" name: gather-dockercfg-xsxhl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 361c36d3-e50a-44bf-a437-dab7e2e1982d resourceVersion: "25109" uid: 7536eed6-8932-4853-a18b-c88711a4b1a2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-20T20:01:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"aad80b3c-9f23-4b78-9ed4-1cba797ea074"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:38Z" name: insights-runtime-extractor-sa-dockercfg-lxzp7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: aad80b3c-9f23-4b78-9ed4-1cba797ea074 resourceVersion: "25132" uid: e0dc1d4c-5913-4b92-adc0-46ee97a8f1fa type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T20:08:04Z" service.beta.openshift.io/expiry: "2028-04-19T20:08:04Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 9ed645f6-7dc5-4c28-93d6-369dd3c5957e creationTimestamp: "2026-04-20T20:08:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"9ed645f6-7dc5-4c28-93d6-369dd3c5957e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T20:08:05Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 9ed645f6-7dc5-4c28-93d6-369dd3c5957e resourceVersion: "7909" uid: c30c016b-570c-4c7a-bf8e-01b6f607c444 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T20:08:05Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 6d7d7cae-e8fe-4f37-9f93-47efa1a70180 service.beta.openshift.io/expiry: "2028-04-19T20:08:05Z" creationTimestamp: "2026-04-20T20:08:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"6d7d7cae-e8fe-4f37-9f93-47efa1a70180"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T20:08:05Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 6d7d7cae-e8fe-4f37-9f93-47efa1a70180 resourceVersion: "7912" uid: 6287059d-a7c5-4ad0-8947-d7d30950fa7c type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-20T20:01:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"af3be855-c6ff-4fa4-a8a9-9ee8d47621c0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T20:01:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T20:37:39Z" name: operator-dockercfg-hfvmp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: af3be855-c6ff-4fa4-a8a9-9ee8d47621c0 resourceVersion: "25159" uid: 4e2a4f6e-0f2d-42b8-b05a-6e378896e6e0 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42999"