--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T21:26:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9542bc19-c1d0-4e57-8904-27f1b1c6a194"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:28Z" name: builder-dockercfg-wwqsc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9542bc19-c1d0-4e57-8904-27f1b1c6a194 resourceVersion: "4337" uid: 67392e33-6ab7-4f89-bffa-6a1e4aeee2fd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T21:26:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1990ed37-bc9b-4171-be5e-e1e1080d15d1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:24Z" name: default-dockercfg-mvfww namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1990ed37-bc9b-4171-be5e-e1e1080d15d1 resourceVersion: "3832" uid: fa63f928-9a61-4305-8eca-72fde90f1a46 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T21:26:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"51e62101-32d5-4ff4-967d-e01dc1e591db"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:28Z" name: deployer-dockercfg-dl2wx namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 51e62101-32d5-4ff4-967d-e01dc1e591db resourceVersion: "4326" uid: 1de5ac1a-7f95-4989-bfaf-0b250d3ad6df type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-24T21:26:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ba40ba1b-79b4-4e4a-8bfd-4fe03134b9b9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:24Z" name: gather-dockercfg-whmdg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: ba40ba1b-79b4-4e4a-8bfd-4fe03134b9b9 resourceVersion: "3833" uid: 2ad93beb-4315-421e-858a-23903bf2f02a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-24T21:26:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6e9c8138-393b-4018-a192-a22a76b0bbfd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:24Z" name: insights-runtime-extractor-sa-dockercfg-r5h69 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 6e9c8138-393b-4018-a192-a22a76b0bbfd resourceVersion: "3835" uid: 678c49f4-8858-40e5-b802-a44f650cf8c2 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:31:32Z" service.beta.openshift.io/expiry: "2028-04-23T21:31:32Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 0b8356ef-7e94-4cb5-b9be-5be8bcb997fd creationTimestamp: "2026-04-24T21:31:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"0b8356ef-7e94-4cb5-b9be-5be8bcb997fd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:31:33Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 0b8356ef-7e94-4cb5-b9be-5be8bcb997fd resourceVersion: "7887" uid: c2d25102-20ba-4cf5-a5af-0b19a7ddd84d type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T21:31:26Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 7e2985d9-a4e5-4e97-89fd-2177d1c89924 service.beta.openshift.io/expiry: "2028-04-23T21:31:26Z" creationTimestamp: "2026-04-24T21:31:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7e2985d9-a4e5-4e97-89fd-2177d1c89924"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T21:31:27Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 7e2985d9-a4e5-4e97-89fd-2177d1c89924 resourceVersion: "7743" uid: 545fe8c8-688d-4dfa-afe8-f9ccca570188 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-24T21:26:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ee18c932-db5d-4d63-bd2e-78993a1a484d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T21:26:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T21:26:24Z" name: operator-dockercfg-wgtmw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: ee18c932-db5d-4d63-bd2e-78993a1a484d resourceVersion: "3836" uid: 768f599b-8a9f-48da-90a5-c8682d21f74e type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21521"