--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-18T16:40:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"43f7bbdd-f811-4bb6-9c98-2694914f979f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:15Z" name: builder-dockercfg-59knn namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 43f7bbdd-f811-4bb6-9c98-2694914f979f resourceVersion: "23481" uid: c7173922-0b46-4315-a002-c170d6cc31d9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-18T16:40:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"61f9bdc4-3955-4d7d-8c45-0df2e0c7ca7a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:13Z" name: default-dockercfg-p4tbm namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 61f9bdc4-3955-4d7d-8c45-0df2e0c7ca7a resourceVersion: "23277" uid: d7f88acb-8405-4952-ae68-b0bf31b716e7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-18T16:40:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"08899697-53de-4a3e-9525-f7ef9b0e35de"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:15Z" name: deployer-dockercfg-m4b7v namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 08899697-53de-4a3e-9525-f7ef9b0e35de resourceVersion: "23492" uid: e09c8c83-402e-431b-b025-40823fbf20f1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-03-18T16:40:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b4b5aa25-8502-4f03-a665-7ab2d57ae746"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:13Z" name: gather-dockercfg-5x4bp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: b4b5aa25-8502-4f03-a665-7ab2d57ae746 resourceVersion: "23297" uid: 61b7dfd8-daca-4d27-a1d5-a13b2223b2db type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-03-18T16:40:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"282af082-90a8-4006-81b1-3656016afe49"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:13Z" name: insights-runtime-extractor-sa-dockercfg-h8gkt namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 282af082-90a8-4006-81b1-3656016afe49 resourceVersion: "23411" uid: 9598b621-be62-442c-b679-3ad3985ec0a0 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T16:46:58Z" service.beta.openshift.io/expiry: "2028-03-17T16:46:58Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: ccddd896-f858-454a-b6db-778ae280d5c5 creationTimestamp: "2026-03-18T16:46:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"ccddd896-f858-454a-b6db-778ae280d5c5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T16:46:58Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: ccddd896-f858-454a-b6db-778ae280d5c5 resourceVersion: "7843" uid: 25bd74cc-2176-410a-b5d4-ca28a35304a1 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-17T16:46:53Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 35b375c6-8b8e-4d07-9b17-4e66cf3acc71 service.beta.openshift.io/expiry: "2028-03-17T16:46:53Z" creationTimestamp: "2026-03-18T16:46:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"35b375c6-8b8e-4d07-9b17-4e66cf3acc71"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-18T16:46:54Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 35b375c6-8b8e-4d07-9b17-4e66cf3acc71 resourceVersion: "7761" uid: 3bf7d11c-495d-416d-b462-80ddc40a8ef6 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-03-18T16:40:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3146a2cf-c2bc-423d-941d-070422f767d5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-18T16:40:56Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-18T17:17:13Z" name: operator-dockercfg-mcps4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 3146a2cf-c2bc-423d-941d-070422f767d5 resourceVersion: "23384" uid: 3afad018-ab23-4a9f-b24b-68b236baebee type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "34155"