--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T03:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0883b19c-5dae-4b36-b455-cd0cad374c80"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:37Z" name: builder-dockercfg-ppn4k namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0883b19c-5dae-4b36-b455-cd0cad374c80 resourceVersion: "26370" uid: b9336dac-c0a6-4ef4-8033-4db18e649b8e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T03:54:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"60ae0410-eb86-46be-a295-c1e9b5ac15ab"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:32Z" name: default-dockercfg-tvvdv namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 60ae0410-eb86-46be-a295-c1e9b5ac15ab resourceVersion: "26224" uid: c90afd10-6520-476c-be4c-dd0f7ad10d64 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T03:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fcf69052-7e10-4989-af1b-83a9051007ed"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:37Z" name: deployer-dockercfg-rf28l namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: fcf69052-7e10-4989-af1b-83a9051007ed resourceVersion: "26392" uid: 333e435e-8da0-4884-a42d-04468a2c7c11 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-21T03:54:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"042f2a4d-6c71-49ff-8205-deaf7fdc4e8a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:32Z" name: gather-dockercfg-nzpgg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 042f2a4d-6c71-49ff-8205-deaf7fdc4e8a resourceVersion: "26209" uid: 31904a15-46f3-4cf3-b5f6-bb6db53da6ec type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-21T03:54:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"70c697d1-3e25-4cbc-9ce6-5c00615d76f7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:32Z" name: insights-runtime-extractor-sa-dockercfg-qz42s namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 70c697d1-3e25-4cbc-9ce6-5c00615d76f7 resourceVersion: "26204" uid: d38ba912-e2f5-4112-b9b8-0ebd8092f12f type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T03:58:15Z" service.beta.openshift.io/expiry: "2028-04-20T03:58:15Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: dd089811-6d02-4f09-9d0a-806c03c72bb7 creationTimestamp: "2026-04-21T03:58:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"dd089811-6d02-4f09-9d0a-806c03c72bb7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T03:58:15Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: dd089811-6d02-4f09-9d0a-806c03c72bb7 resourceVersion: "7506" uid: 1703f6cd-a69a-4b64-a648-0a5bb5bf90bd type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T03:58:09Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 33fca61d-cb48-45b4-bc78-ad8552b342e2 service.beta.openshift.io/expiry: "2028-04-20T03:58:09Z" creationTimestamp: "2026-04-21T03:58:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"33fca61d-cb48-45b4-bc78-ad8552b342e2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T03:58:10Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 33fca61d-cb48-45b4-bc78-ad8552b342e2 resourceVersion: "7368" uid: a8d2386d-c709-4ef5-bf47-b1a860aa6e70 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-21T03:54:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2a8fbdfc-1333-432a-ba13-780691d7746a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T03:54:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:30:32Z" name: operator-dockercfg-bbz6s namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 2a8fbdfc-1333-432a-ba13-780691d7746a resourceVersion: "26214" uid: 12ca075f-5ebb-497e-8820-9e635bc3a743 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41843"