--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:43:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bc95d8d0-36bb-4e2b-bd79-fb22ec838921"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:32Z" name: builder-dockercfg-s8lvq namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bc95d8d0-36bb-4e2b-bd79-fb22ec838921 resourceVersion: "25601" uid: 49b94261-d10d-4597-93f3-b976b9d64b61 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:43:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4b69ae4b-6580-4b24-a3e1-626a4cca4c5f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:27Z" name: default-dockercfg-zvsbk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 4b69ae4b-6580-4b24-a3e1-626a4cca4c5f resourceVersion: "25431" uid: 4b1962c1-785d-48d3-9681-f6fe3e385e82 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:43:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e97b78c3-5ea0-49d6-bbdb-5ece7a3de240"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:32Z" name: deployer-dockercfg-4g5lf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e97b78c3-5ea0-49d6-bbdb-5ece7a3de240 resourceVersion: "25612" uid: 1b7483e2-e5f5-4849-9bbc-b401a1acb0e0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T18:43:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bf3a5613-d91b-4fd7-8846-4a6a6d22cff9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:27Z" name: gather-dockercfg-9jjpn namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: bf3a5613-d91b-4fd7-8846-4a6a6d22cff9 resourceVersion: "25423" uid: 14aeec31-7c8a-4a6c-af5a-e12dc55032c4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T18:43:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"76c4fdcb-5f19-4b43-90a1-0be90c25659f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:27Z" name: insights-runtime-extractor-sa-dockercfg-n2rqf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 76c4fdcb-5f19-4b43-90a1-0be90c25659f resourceVersion: "25434" uid: bb7defa6-c797-470c-b493-36d7d2b7d462 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:49:17Z" service.beta.openshift.io/expiry: "2028-04-21T18:49:17Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 24844350-6281-45c6-bd55-741b5ccd6c22 creationTimestamp: "2026-04-22T18:49:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"24844350-6281-45c6-bd55-741b5ccd6c22"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:49:18Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 24844350-6281-45c6-bd55-741b5ccd6c22 resourceVersion: "7886" uid: ec421efb-0fe6-4da4-aac9-abfff7008ea2 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:49:12Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 58d4a51f-74f5-44d9-8250-1187fd66755a service.beta.openshift.io/expiry: "2028-04-21T18:49:12Z" creationTimestamp: "2026-04-22T18:49:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"58d4a51f-74f5-44d9-8250-1187fd66755a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:49:13Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 58d4a51f-74f5-44d9-8250-1187fd66755a resourceVersion: "7775" uid: eecc8461-a58a-4d99-a960-579c29e3f1e8 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T18:43:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"66d4873c-c033-45e4-959e-b76d78e78f1d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:43:27Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:27Z" name: operator-dockercfg-pbsnd namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 66d4873c-c033-45e4-959e-b76d78e78f1d resourceVersion: "25445" uid: 4afcb571-41b0-402d-9d8b-5e6aa8129b3a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "42526"