--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T15:59:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6abfd1f0-90de-40b7-998b-99da17ece087"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:16Z" name: builder-dockercfg-zzlg7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 6abfd1f0-90de-40b7-998b-99da17ece087 resourceVersion: "3440" uid: cae2f31f-397c-4ac5-bf47-5014712c91e7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T15:59:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5dc0bce2-f7fe-4800-8bdc-7f9ee7a774f5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:12Z" name: default-dockercfg-6jc9x namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5dc0bce2-f7fe-4800-8bdc-7f9ee7a774f5 resourceVersion: "2865" uid: 567a702b-e9c2-482b-93d8-9cd6feac7715 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T15:59:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"be50b115-bad3-4c3e-a707-59dbeceea9c4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:16Z" name: deployer-dockercfg-gnj9d namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: be50b115-bad3-4c3e-a707-59dbeceea9c4 resourceVersion: "3448" uid: 96207a0e-a8b9-4f99-b5b9-32ca63eec587 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T15:59:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b3e65eea-8f96-4e12-9cd2-ce61db8da019"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:12Z" name: gather-dockercfg-cd4tl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: b3e65eea-8f96-4e12-9cd2-ce61db8da019 resourceVersion: "2868" uid: c5f287b7-b834-466b-b3bd-5b9fa0204288 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T15:59:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"68624bf6-ca07-4f57-9e52-c7ad5ea75a92"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:12Z" name: insights-runtime-extractor-sa-dockercfg-p4mnm namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 68624bf6-ca07-4f57-9e52-c7ad5ea75a92 resourceVersion: "2869" uid: 2ff65bbc-83e3-4bf2-bd59-14d5ca0752a1 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T16:05:36Z" service.beta.openshift.io/expiry: "2028-04-15T16:05:36Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: dc3468e0-5988-4e66-a0a4-1227cd7b0c90 creationTimestamp: "2026-04-16T16:05:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"dc3468e0-5988-4e66-a0a4-1227cd7b0c90"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T16:05:37Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: dc3468e0-5988-4e66-a0a4-1227cd7b0c90 resourceVersion: "8054" uid: b1021350-6c3a-42e3-a060-b6eb39db66e6 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T16:05:31Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 8ff1438e-5463-4973-b5c9-ab7af07be63e service.beta.openshift.io/expiry: "2028-04-15T16:05:31Z" creationTimestamp: "2026-04-16T16:05:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8ff1438e-5463-4973-b5c9-ab7af07be63e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T16:05:32Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 8ff1438e-5463-4973-b5c9-ab7af07be63e resourceVersion: "7926" uid: e1bfb5a1-526a-47b2-99eb-c2129dc5baef type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T15:59:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T15:59:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"132fc90e-6ba6-4109-9d5c-5c59018248a5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T15:59:12Z" name: operator-dockercfg-vstnw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 132fc90e-6ba6-4109-9d5c-5c59018248a5 resourceVersion: "2879" uid: 980908a0-1be0-46aa-9f76-3809e9e2e229 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21377"