--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:19:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cb8ee21a-a773-4021-a4a0-1d024162018b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:43Z" name: builder-dockercfg-cwjvb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: cb8ee21a-a773-4021-a4a0-1d024162018b resourceVersion: "3381" uid: 0862f89d-b2ec-4544-aa66-e2ce26fd2834 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:19:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b6a1c151-6faf-494a-bdb0-1ef813b2e421"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:39Z" name: default-dockercfg-dhp5v namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b6a1c151-6faf-494a-bdb0-1ef813b2e421 resourceVersion: "2885" uid: c578f180-d901-4420-ad9e-2b6f3c981aa3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:19:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"47b628a0-abac-40bd-9967-8c31f555cd7a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:43Z" name: deployer-dockercfg-rsn6c namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 47b628a0-abac-40bd-9967-8c31f555cd7a resourceVersion: "3382" uid: a7f50755-3259-44d5-8d85-54f56090e366 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T19:19:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c83991a-0e46-4f85-b24c-ad1082a3c17d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:39Z" name: gather-dockercfg-pvzrz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 5c83991a-0e46-4f85-b24c-ad1082a3c17d resourceVersion: "2895" uid: fc08334c-2fd3-4738-950f-d30740bf030d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T19:19:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58b2f64c-1079-40f9-9914-6c1632af7793"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:39Z" name: insights-runtime-extractor-sa-dockercfg-np8h6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 58b2f64c-1079-40f9-9914-6c1632af7793 resourceVersion: "2907" uid: 7f5b0250-1067-416f-90f7-c1b209cddf27 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:25:37Z" service.beta.openshift.io/expiry: "2028-04-21T19:25:37Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 5a21d54f-571f-4207-ac78-221ae027ed3b creationTimestamp: "2026-04-22T19:25:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5a21d54f-571f-4207-ac78-221ae027ed3b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:25:38Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 5a21d54f-571f-4207-ac78-221ae027ed3b resourceVersion: "7759" uid: 3cff612d-e8fe-463e-ab61-f8ec0d3340ec type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:25:37Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 4a7c8a2b-61b9-412b-aaf2-6d4e41e6fd80 service.beta.openshift.io/expiry: "2028-04-21T19:25:37Z" creationTimestamp: "2026-04-22T19:25:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"4a7c8a2b-61b9-412b-aaf2-6d4e41e6fd80"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:25:38Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 4a7c8a2b-61b9-412b-aaf2-6d4e41e6fd80 resourceVersion: "7764" uid: b433c944-6a77-478f-982a-4459aab5187f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T19:19:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"315085ec-b620-44a0-864e-46ccffb71703"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:19:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:19:39Z" name: operator-dockercfg-pz4cs namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 315085ec-b620-44a0-864e-46ccffb71703 resourceVersion: "2903" uid: cd0e9c50-9ee6-4f61-9944-2b9a21f1aa22 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21556"