--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T16:35:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ed6736fb-cbe6-4645-9dc4-527e3117818a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:50Z" name: builder-dockercfg-xxrjl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ed6736fb-cbe6-4645-9dc4-527e3117818a resourceVersion: "4035" uid: 94850165-5ebd-4a53-92af-f08c1cbe8268 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T16:35:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4aadfdd5-2249-4bbb-891a-1c6b630f7cc8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:46Z" name: default-dockercfg-lkwlr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4aadfdd5-2249-4bbb-891a-1c6b630f7cc8 resourceVersion: "3517" uid: 005fc86b-5149-4df6-a7ce-525033f50db7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T16:35:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"943afbc8-0cf6-4a34-aaec-67aead8c0200"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:50Z" name: deployer-dockercfg-29q8w namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 943afbc8-0cf6-4a34-aaec-67aead8c0200 resourceVersion: "4030" uid: cb09e4ca-dca6-4b8c-858c-9b0b2281a0b6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-24T16:35:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"925b3f82-a374-4ff1-9760-82fcd1508ba4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:46Z" name: gather-dockercfg-72snr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 925b3f82-a374-4ff1-9760-82fcd1508ba4 resourceVersion: "3528" uid: e95b0a56-d607-42d4-89be-c3b9afb8b632 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-24T16:35:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c0d9772d-5809-43ae-90ee-b60f88135d0d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:46Z" name: insights-runtime-extractor-sa-dockercfg-zvkrd namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: c0d9772d-5809-43ae-90ee-b60f88135d0d resourceVersion: "3530" uid: 013397df-8b46-4039-8f50-bc9106c9a88e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJRUkyQTNZNjlsRkV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTBPRGt3TXpBZQpGdzB5TmpBME1qUXhOalF4TlRWYUZ3MHlPREEwTWpNeE5qUXhOVFphTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFMakJXSW5YcjRDOW9hMW4zRnNudlVGNHBwNHU4UnBhb1k0RHJNVnlyVy9lWWFUQgpXWVNTdmRDeXlUTGJmU2o0Zm92R1hvTk9nSVpucjVuYjZkWmV3UDBrN2FNQTFseGRURktwOUlWd2hkSnN0MlZTCkc5cHNCd05BYkc2Vk1yWUF1VEhzWGkrQXF5NytTb25xR081TkNCWmZOajVKdk1kV3JMSk1oQUF3aENCRCtCMWkKdWdtbVRpSDRoanhXZTZxVXc3L0NtVkxZVVFVY3FJdzBDU1pETkZLSzVnQmoyNW5FeGhVSUVMZEhMT1VXeE1IcQpIdUp6RXFnT0xvU0E1SkptRE9wRVFtaEw2TFRUT2tvbEsyNzFPYWJ4eUg5cnhYcVUyZElDd0FKUFFWeWhHNFdjClJaYmdBM1dTSEdNUzE1RlB6VUtnd3puYkZBNmVGZHhFN1A4TUZmOENBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCUlVQTE9kWmMzVTlOVXJtd0RYTkxUbXR5OXVkVEFmQmdOVkhTTUVHREFXZ0JTNHdJSk0yUU9sCnpLZ0dWWmRXaTBRRDdhWEd5VENCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rWVRneE1qSmlZMk10T1RJNE9TMDBNbUl6TFdJd09UUXROV1ppT1dSbApaVGRqTldaaE1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQUxLTkEvOUVBQVZ2RjRxT09RK1dVMGhiQWNuZEJDCkpzbkxNdzM0UGdTalhpanU3RFhydWFKcGF4Z3lkOXEzTHR4SzhIeDB2YzUvek1BaFZsTVorR0ZTdlh1bnFwODkKQ1lvQ2krRWJnVVh1alpHME1OYmgvM3VueTIvR1FEUGZsZXdQZ3QyUG10S2VJSGlwckJPUk9kOWJIWGlXWTJINQowUENyRnZtU1pDSlBjNzhKTmhFNjJjd1dma09SUkMzQmIrNFBlY2RsL0VidDFubmQwV0k5NG05Ym9PQkliWFNLClU4bUpSejJrQzlwYmRkaEFJcDliSy9vQS9ZUDdVdUF4aWdCRkNJV2xDaE9vendocUMwWFo3emxLSUJVZ0VTNEwKQlNSYUFGY1NGaXBoemRBbXNtOGxuN0UrUXNWZkU5L0pvNDhxNTVPTzVTbHlWNWNRcUc3SE4rN1UKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlTNUJvb0wzTzRMQXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpBME9Ea3dNekFlCkZ3MHlOakEwTWpReE5qUXhOREphRncweU9EQTJNakl4TmpReE5ETmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Y3dORGc1TURNd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFETnJrditZV3lDSnNIZzJwcnJTakxZY2E3K2ZIVW84Q1RhCnF3M1pIckx3NDhVdlMraDUyZmRrMVFRd21xRkpKN1g4ZHVMMzB3dXpmZm9xcmowUmhPVmlQTzFjU3BsVVZjRFUKSkc0bUptNGtEdVNiMHRZUEdidUNBbW4ySXVjM0NmMGNoYU9NVkxmNTg3SUFRWU1mSTVtSXlOZERZNmlNMzBhYgprUndoVkN3dllZOHhuVndoZGNhTEIwazFTb3E4YTA2b2pQT1JxODRYZ3hDQ1hhMHRQb3VrS1JtVUthZnBxWVBmCk1rT2FuT09QVGM3dEtRYTFlZitNVDRVRFJLU1VvVXhSM3RpU3V5WmpsRW94SHpIVnlETkV6djJ3WG9IeFM1Q1kKRU9mRVpLUjdtcEpVWC9zMlljK3BOKzI2WFAyMlhsL2FwcVVqQ1JmRXJQZTYzT0hnZ2wyUkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUzR3SUpNCjJRT2x6S2dHVlpkV2kwUUQ3YVhHeVRBZkJnTlZIU01FR0RBV2dCUzR3SUpNMlFPbHpLZ0dWWmRXaTBRRDdhWEcKeVRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWF4b215RFNjS2NEMWJwc3UvUHJuYjVLTlEwRk9FZ0ZkaFluVgpIWEJ2bnFyek9kb1EwQVRUQ2phcGhKNHU5Y3ZoV3BrM0tWNWJwc3E5NGNyRGc5c3l2clo3R0s5SzdRSlVUNGhxClV3OElIeTBnWjFEQ3U2TGxEMzdBRGVHbEE1RzJmWHQ0b1hONWxXNWU2NEZuMGpDMFpldGM0RzdpZG5MVHBNdDEKSE4rVjhDUVlpTmVRNitOeFpLVGwxL2lqMzNYZGxDTURRVDZsRElqVXU4OTYxblRHOVM5eTRwTmNQSkF4YXJXUApiYy9IWXEvbFpndEZLdEN2TDloNFcwb1BFMlNRckRUMnMxdW0xTWlwWnlEbkpCR3NSWmFwODFGekNvNEF0bngrCnNBbFoxYU41a3l1dTBKNEYzYTRTQVRkN3NsTGQ4RFJtVjJscGVZWUMvTnhnSHA4aHlnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T16:41:56Z" service.beta.openshift.io/expiry: "2028-04-23T16:41:56Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: a8122bcc-9289-42b3-b094-5fb9dee7c5fa creationTimestamp: "2026-04-24T16:41:56Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"a8122bcc-9289-42b3-b094-5fb9dee7c5fa"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T16:41:56Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: a8122bcc-9289-42b3-b094-5fb9dee7c5fa resourceVersion: "7636" uid: c43da5ed-f8c6-4b37-95ce-0c7d3778890a type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T16:41:50Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: c456986e-697b-4569-ae4f-a09bf7605096 service.beta.openshift.io/expiry: "2028-04-23T16:41:50Z" creationTimestamp: "2026-04-24T16:41:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"c456986e-697b-4569-ae4f-a09bf7605096"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T16:41:51Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: c456986e-697b-4569-ae4f-a09bf7605096 resourceVersion: "7518" uid: 8eb9ae22-937c-46bd-bd29-49542f108a93 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-24T16:35:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4a59a48c-1ed1-4ae8-b39c-0d05ce9fef68"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T16:35:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T16:35:46Z" name: operator-dockercfg-kbj5t namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 4a59a48c-1ed1-4ae8-b39c-0d05ce9fef68 resourceVersion: "3531" uid: c9004d28-4ccf-42ce-8cf6-68105a74d891 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "15358"