--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T23:49:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6d41358a-7dc8-4881-904c-546210b12a33"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:09Z" name: builder-dockercfg-w559s namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6d41358a-7dc8-4881-904c-546210b12a33 resourceVersion: "4188" uid: 7aecccfc-058f-44f0-aa50-0c46c0323b73 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T23:49:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"265f732b-90e0-4c56-ad1f-6f24ec62d774"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:08Z" name: default-dockercfg-xvwwb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 265f732b-90e0-4c56-ad1f-6f24ec62d774 resourceVersion: "4072" uid: 95dce8b0-4895-4227-b47a-b1f8b4430129 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T23:49:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6a69170-5bb0-4edc-a9be-bdb6856fb5a7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:09Z" name: deployer-dockercfg-lclbq namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d6a69170-5bb0-4edc-a9be-bdb6856fb5a7 resourceVersion: "4187" uid: e593d51b-d9ed-4bcc-b46f-d92b8d087499 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-24T23:49:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"10e86f53-1451-411b-9084-356338d10d34"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:08Z" name: gather-dockercfg-mbxtt namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 10e86f53-1451-411b-9084-356338d10d34 resourceVersion: "4069" uid: 04edca64-ac1a-4188-ac42-0dcd5136d05d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-24T23:49:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"38117aa4-041e-4b20-b6c0-3ba9fea28388"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:08Z" name: insights-runtime-extractor-sa-dockercfg-rp52n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 38117aa4-041e-4b20-b6c0-3ba9fea28388 resourceVersion: "4070" uid: 6f567434-eeee-4ae9-b2d4-bf620018ade6 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T23:56:07Z" service.beta.openshift.io/expiry: "2028-04-23T23:56:07Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 3a00ec27-8a37-4f89-8792-5f5d9818d544 creationTimestamp: "2026-04-24T23:56:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"3a00ec27-8a37-4f89-8792-5f5d9818d544"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T23:56:07Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 3a00ec27-8a37-4f89-8792-5f5d9818d544 resourceVersion: "8115" uid: c8d4b5dd-a242-43ef-894a-a932a564ece8 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T23:56:01Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: c809c877-e05e-429f-a119-b40c2f67383f service.beta.openshift.io/expiry: "2028-04-23T23:56:01Z" creationTimestamp: "2026-04-24T23:56:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"c809c877-e05e-429f-a119-b40c2f67383f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T23:56:02Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: c809c877-e05e-429f-a119-b40c2f67383f resourceVersion: "8009" uid: 0af2e43b-28dc-465c-ac6b-c84add8de7ea type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-24T23:49:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fe302729-1a7d-49e1-b9f7-786177176e78"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T23:49:44Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T23:50:08Z" name: operator-dockercfg-jvmmr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: fe302729-1a7d-49e1-b9f7-786177176e78 resourceVersion: "4071" uid: b41ca9a3-6c82-49eb-93d9-a0a8ff8a182d type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "22036"