--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T23:50:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"07c12f09-6ad3-411d-a0cd-08213fac0c07"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:51Z" name: builder-dockercfg-brj99 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 07c12f09-6ad3-411d-a0cd-08213fac0c07 resourceVersion: "38574" uid: 52402ee7-ec19-4f96-b6d6-8453a7175dd6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T23:50:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"896e7fce-2f51-4c5a-8b5c-12b488635595"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:46Z" name: default-dockercfg-vnxr9 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 896e7fce-2f51-4c5a-8b5c-12b488635595 resourceVersion: "38396" uid: b82309b4-215d-4998-b146-aa302d118adb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T23:50:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"da17ef6e-5357-43e0-9265-1f8c9b1e1629"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:51Z" name: deployer-dockercfg-2r7t5 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: da17ef6e-5357-43e0-9265-1f8c9b1e1629 resourceVersion: "38569" uid: cc5d5f16-f143-41dc-9c94-291cd264be55 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-24T23:50:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"82bc5973-e470-4064-b1b3-393e653fbc19"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:46Z" name: gather-dockercfg-p57ht namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 82bc5973-e470-4064-b1b3-393e653fbc19 resourceVersion: "38400" uid: e32b2e47-feee-4859-911b-7162b1a3397e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-24T23:50:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8611a304-a1e6-4f26-b496-5099cd754f1b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:46Z" name: insights-runtime-extractor-sa-dockercfg-gprwq namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 8611a304-a1e6-4f26-b496-5099cd754f1b resourceVersion: "38398" uid: cec3c6fa-73a6-4002-b821-db76977d050b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T23:54:38Z" service.beta.openshift.io/expiry: "2028-04-23T23:54:38Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 28db972e-84a1-48cc-b1a4-c974289025ea creationTimestamp: "2026-04-24T23:54:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"28db972e-84a1-48cc-b1a4-c974289025ea"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T23:54:39Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 28db972e-84a1-48cc-b1a4-c974289025ea resourceVersion: "7224" uid: dfd156b5-03c8-43b4-96c1-3d805a310091 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T23:54:32Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 1cf3392a-5b2b-465e-b08c-c7fe9f0a715b service.beta.openshift.io/expiry: "2028-04-23T23:54:32Z" creationTimestamp: "2026-04-24T23:54:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"1cf3392a-5b2b-465e-b08c-c7fe9f0a715b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T23:54:33Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 1cf3392a-5b2b-465e-b08c-c7fe9f0a715b resourceVersion: "7121" uid: 68257f7d-86be-4785-a0d4-1abf0703bfef type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-24T23:50:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"500dafff-763a-49f1-af86-1f8e0d170179"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:50:46Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-25T00:26:46Z" name: operator-dockercfg-lj5ln namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 500dafff-763a-49f1-af86-1f8e0d170179 resourceVersion: "38405" uid: 4f96cee4-5496-4ccc-8cb2-92d879b55914 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "55472"