--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T13:55:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0c753247-389c-4f91-8c7e-30d1b09cb37f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:41Z" name: builder-dockercfg-h9vb7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0c753247-389c-4f91-8c7e-30d1b09cb37f resourceVersion: "3740" uid: a58b46e0-a074-4b5d-ba04-5c631d37877b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T13:55:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"09111c1b-959f-49c6-b794-7fdb9ab1dcb2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:37Z" name: default-dockercfg-ltzm7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 09111c1b-959f-49c6-b794-7fdb9ab1dcb2 resourceVersion: "3158" uid: 2ec95edb-3aaf-4b27-8354-e32f6e5809a6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T13:55:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2d2a735b-e25f-4ee0-9f00-080c3ef6abcb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:41Z" name: deployer-dockercfg-5dphw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2d2a735b-e25f-4ee0-9f00-080c3ef6abcb resourceVersion: "3741" uid: a6e78dbf-ea4a-4e3d-a22c-5dea58b33cb4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T13:55:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"01dac02c-a1fc-419f-a44a-61c6e4a5b792"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:37Z" name: gather-dockercfg-ql9nj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 01dac02c-a1fc-419f-a44a-61c6e4a5b792 resourceVersion: "3159" uid: ce69d788-fcd8-4355-8de3-4e1da2e7013a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T13:55:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2bf6285c-f4dc-4003-8284-69bcaad98fc7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:37Z" name: insights-runtime-extractor-sa-dockercfg-fhg6t namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 2bf6285c-f4dc-4003-8284-69bcaad98fc7 resourceVersion: "3160" uid: 160b965c-81d1-4f98-89fd-e1adf7dcf62e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:01:33Z" service.beta.openshift.io/expiry: "2028-04-15T14:01:33Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 348ed9f4-9d2a-44fe-aaef-5642220f2bea creationTimestamp: "2026-04-16T14:01:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"348ed9f4-9d2a-44fe-aaef-5642220f2bea"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:01:34Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 348ed9f4-9d2a-44fe-aaef-5642220f2bea resourceVersion: "7942" uid: b7bab70e-4478-4c53-9426-09e0db31b2c6 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:01:28Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: ad64fccd-1abc-4df9-8ae1-49cc467964d5 service.beta.openshift.io/expiry: "2028-04-15T14:01:28Z" creationTimestamp: "2026-04-16T14:01:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ad64fccd-1abc-4df9-8ae1-49cc467964d5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:01:29Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: ad64fccd-1abc-4df9-8ae1-49cc467964d5 resourceVersion: "7785" uid: a69b04d8-e46f-43b7-96a5-154fc46c357c type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T13:55:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c494d4de-0b8d-4000-b817-bb9e5ac2b627"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T13:55:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T13:55:37Z" name: operator-dockercfg-jq72r namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: c494d4de-0b8d-4000-b817-bb9e5ac2b627 resourceVersion: "3185" uid: 276cd2d4-e6be-49b5-b951-727534403329 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37638"