--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-18T16:40:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dc0d4a1e-b226-4d2f-bfa0-1033e99d5c4d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:15Z" name: builder-dockercfg-pc5jg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: dc0d4a1e-b226-4d2f-bfa0-1033e99d5c4d resourceVersion: "23383" uid: 5382b029-9b75-4223-8b91-c14359be8398 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-18T16:40:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"caddbf45-4dca-48dd-8350-55b0cec69c93"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:13Z" name: default-dockercfg-pjqtw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: caddbf45-4dca-48dd-8350-55b0cec69c93 resourceVersion: "23198" uid: b05b4b31-e07c-4501-9f27-10b1443efe4e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-18T16:40:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8d050287-75ef-4ef9-8c3b-c60316b4bb4f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:15Z" name: deployer-dockercfg-t96w4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8d050287-75ef-4ef9-8c3b-c60316b4bb4f resourceVersion: "23349" uid: c251a555-ab9d-4731-9679-e70d4f0489f2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-03-18T16:40:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d5fc0ddd-808b-4693-a984-de4ae4cf1058"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:13Z" name: gather-dockercfg-sxqdx namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: d5fc0ddd-808b-4693-a984-de4ae4cf1058 resourceVersion: "23155" uid: c5dd8df9-da38-436c-b61b-4661f34f10bf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-03-18T16:40:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"415a9540-fd38-4551-9100-16b7c9f08c7c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:13Z" name: insights-runtime-extractor-sa-dockercfg-jqp6n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 415a9540-fd38-4551-9100-16b7c9f08c7c resourceVersion: "23165" uid: 9278bcce-4d15-42b6-b492-aec7b5f20257 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T16:46:53Z" service.beta.openshift.io/expiry: "2028-03-17T16:46:53Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 75a599fb-fc9c-419f-ad86-4a177f0c7c9c creationTimestamp: "2026-03-18T16:46:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"75a599fb-fc9c-419f-ad86-4a177f0c7c9c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T16:46:54Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 75a599fb-fc9c-419f-ad86-4a177f0c7c9c resourceVersion: "7756" uid: e8f7ad2b-f2a6-4f48-8153-6d6bc2bd74fd type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJWGliblFlL2FDYjh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM016ZzFNak01T0RBZQpGdzB5TmpBek1UZ3hOalEyTkRkYUZ3MHlPREF6TVRjeE5qUTJORGhhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQUtvekR3VzZmc2xNdUcxMXBobE9ldFJJYWZZSE5xb0QwSkw2OXJUblBDNU5FRFIzOStOawo4dzNJYjY2L1BWU2NPbW5ySFMyVjNoMzdTM2dLK3BKRGprOW9vRkRKb2kzaVN5ZG1reWZRbXJBNHRCOEU0cExPCnRveWo1aCtTeHF5Zm9hU0hEODB4NHVUZUFBTWlmOC9KOGhTcFZRSWl2NkZuUUhFdFZ5alYvS0V4VVdEWHlLWm8KTGMvbWVxSUtOakxWMTNwZlo1SEt4b2pRVGtBbUlwVkxnMUl0OGI0SVB4RDBEL29NbzFrbEQ5UmpvdnErU0dRNgo2d3lRL2lLQ2MrUmF6QWpXMDg1eGlPMWhTK0hjS1NqdEs2Y2prdGVDYWNSY281Vis5eXZra3lzVys3WXJsTkZiCnl3empudE5leC9sbUdBaTdVMTdpa2wvVGRaSVV5TDJKeWlFQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJRRGxXekhaVk5YSTU1LzhYQVUxbnZQYXN4cTV6QWZCZ05WSFNNRUdEQVdnQlREazc2WDdxTXhURXhnCkdHVVJXL2daN0pqYXNUQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkdRd05UQmxOREUxTFdOa1ptWXROR0V4TkMxaU56UXhMVEk1Ck5EZ3pOekE0WVRBMU5UQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFzQk9lMVBXZTNWbjFIYzlnWDlGRnJXMDgKcFNlMjBOelhSOXdOU2FwL3dKMzlENlBDZEtNL0JOTFJkOWFRaXlvRjJBOWt6RU9aRUIzd3cyQjhaVy85QUIyWQo0SnhNdXNEOEF0a0VZdEpybWRWTUpZTHNtMktKUHp0V2E5anB6eVJSUWRQRHN4QkVVMW1OR0dEWGhWRmZlQjB1CkpLYmFxS2hCL09PZjBUOTJtdFFVRWlXcEMwdWduOFhkY2Q1ajMvUzhQVllHQ0RFNllEaWx6blJjV1RKSWFteXUKeW1rSmRzWjNlTWp2R1dvZU5oaVBSd2M0ajVxSGVpaXBCSUFLWllwM2Q2c3MzYzBzZmowSEg1UDZydDVQV2hqVQpOZ1gwWlZVNHFRRk5ZSXBOd3VPMERoWU1NOXE3WUplaVVTR25ZTm93cnRXNG1GQXlBUnBKTkdXVGovTFZ6QT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJSklBN01NTHJKbE13RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM016ZzFNak01T0RBZQpGdzB5TmpBek1UZ3hOalEyTXpkYUZ3MHlPREExTVRZeE5qUTJNemhhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOek00TlRJek9UZ3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzRsNlZFRmE1Z0lsT2F6V0tWcGJEWGo4aStUWFdXdDRKWgpZdW9DK1ZxUkFBS3JtbE41ekpxSGtZOGRscXBIbXhTMzMwZHlHVjlwamdmdTNQdlpiellNd2hyRW9MaWdrVnVhCkM1cUFnWGZwMXhGRHFSWkR3YkJwWTU1eCtQMXM4RU5YazlxditkZDhkcVhvSFE5WHI0RVZBUDJpd0JHZFZUUFAKY3FWWTNESmVRc0NCOW1FbXdqNmdhMFV5OWZweHpMdnp0emRvQ3NUODQ0V2owcVgzbCtGNmRORmI3RDBSbndxYwpqSXhveWhGNFRDbk5Uc0laQ2xnVlZRUkkzZlh1cUJFTHlxOWJzTC8yUE5kV1RHODJoSFJwbTM2c3lJS0hKK1IwCk01TVBhaUp4aFpCT0g2cmVIcWVCcFI3Nk1uMTVqa0owM3VKb1R4SUpkWTB6NkRIa0xMdUxBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlREazc2WAo3cU14VEV4Z0dHVVJXL2daN0pqYXNUQWZCZ05WSFNNRUdEQVdnQlREazc2WDdxTXhURXhnR0dVUlcvZ1o3SmphCnNUQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFFVnRKNmlIckQrNTJhbnp4bzdtV3NXdFh0Q0xyNW1qMTZ1L2sKQm53aklhTHBIcjVOODNzQUxnTTZCV0pQZTJNQXBZd0xwN1h0anducXRxNk1qZnpoaG8rU00yUjNjWVAwUlJDUQorQVJkQmpycXUvRWE0azNDYnlSWDFQM3VxMTNQMTR5ckpYd3pUNWtVY2lTaVNoQmdIcE9zcTNvd3ozK2pMODBNCkhKcXB6aEFZRHYrak5yemE2ZW1kTkVSQnJTUk51ZGt2Y3hUaTVoRmxldUEvNDl1UHYraG1FNXNXOEhiT3FyTnYKYzNjbC9BcVRpbXpXK2VVS1hKTW1qQkVldlVoWXdadnFTK0VYUzVOQXh3aTRaRC9tbVdqM2lmMUczczZJUDJlOAoxU2hGb0VabTdCUFZFL21vZTF1T2oxUjVXUzlURmhQb3JMVHpNaHZKSzdzRE82TTNSZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T16:46:48Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: d050e415-cdff-4a14-b741-29483708a055 service.beta.openshift.io/expiry: "2028-03-17T16:46:48Z" creationTimestamp: "2026-03-18T16:46:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d050e415-cdff-4a14-b741-29483708a055"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T16:46:48Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: d050e415-cdff-4a14-b741-29483708a055 resourceVersion: "7643" uid: 0b80a21a-9146-4bf9-a449-c52a47e4a61f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-03-18T16:40:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f2d13573-afb2-4c4a-b791-84cc0231d3e7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:13Z" name: operator-dockercfg-xhcft namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: f2d13573-afb2-4c4a-b791-84cc0231d3e7 resourceVersion: "23211" uid: 46b8f403-9edf-471f-afb3-cc6381b5366e type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "28714"