--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:54:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1e04036a-a451-45d5-8a04-3385e0047886"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:42Z" name: builder-dockercfg-87qmw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1e04036a-a451-45d5-8a04-3385e0047886 resourceVersion: "3658" uid: 646085c3-ebf6-47e1-9ceb-f329630977ba type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:54:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fd04e6f0-8c3f-4ab0-8756-36a76d588f1a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:38Z" name: default-dockercfg-m7lqg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: fd04e6f0-8c3f-4ab0-8756-36a76d588f1a resourceVersion: "2968" uid: 745cace4-1c2a-4116-b95f-538a0b342f5b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:54:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"83b36249-15ee-47c9-89f7-6cdd7571b59a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:42Z" name: deployer-dockercfg-m2fdh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 83b36249-15ee-47c9-89f7-6cdd7571b59a resourceVersion: "3647" uid: e80eafff-b5b7-4a76-be97-081360bb4c7e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T19:54:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f1578e2-7fde-4722-b2a5-227d49536d1b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:38Z" name: gather-dockercfg-dlc6j namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 7f1578e2-7fde-4722-b2a5-227d49536d1b resourceVersion: "2983" uid: f88d9e9d-df8e-4c7b-93e9-46e99bde9143 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T19:54:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0e8e048d-9b6b-493f-8726-684cc9d24bcc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:38Z" name: insights-runtime-extractor-sa-dockercfg-t9dg2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 0e8e048d-9b6b-493f-8726-684cc9d24bcc resourceVersion: "2984" uid: 50b16c41-a957-4e1c-bd9c-2b4af4a73bfe type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJUmFNYTZKaDRzZlF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzROemt4TlRBZQpGdzB5TmpBME1qSXhPVFU0TlRCYUZ3MHlPREEwTWpFeE9UVTROVEZhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFMbWM2U1RYNU1xTUhkZGVnVDYyOUkwSCtCUWpaQmNKbDY2bmdOTkNwa3ZoUFpFUgo0a1Z5NjBWemJvNlZHR2MrZy81cDdGWmMrbXl4M2N6SjNrZTlNRzYrM1BRNEgzck9MNVRsYjZTUWcyaldxRks1ClhXYmhqSGRpQUZhRXZSZHlMOEFBczdRTDB5K0xpalZOOW5PZnpVZERCcWZmMHNSaCt2Q1lxbXI3YTgwQVVwejMKSkhKbCtDTEkwV3JzWm96NzE3YWVxVzhEeGlvZXZyQ0hyWnM4OXE5U3ExK2plYlJWdU5tQkF6Y2FWdUl5OSt1WQpFOEZYZUUyQ2JWczRaL2hocWtqRHdidzJmaWV2ZXdFRXdQd2MxclhyVUVtSDFGZmg3cTdwYkl4QVdOTDJSdEtTClhNaWYvSG9VY0tDMHFPeDluMWtMN2MzU0d6YXA0MHF3T250c2svTUNBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCU2IxN1JKZDI2MDBxNms0SUJibWRIYTdGcS9DakFmQmdOVkhTTUVHREFXZ0JRSngxb25RcHZsClQ4dkxwNFFvVkxsT3dIdzk4ekNCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rTTJZell6QXhPV1V0WlRSaE5pMDBNMlk0TFdJNVpXRXRabVJoTkRobQpZek01TUdFMU1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQXpPaUl6bGpjMVlGbEgrS29aQStoR1R4Q29KRFY0CnQvTkZtbWM4ME1hS0plTEpTRHU1Zjh5RDFqZWV4RlN2WmFmTjFFZko3dXBweVFJYis1clh1cFRIWnUwZ0IxRlUKREdsbGxiT1d6dEw0ckJrc0hENUlZcFdoRnJsSUhId2ZnRWFXVWk2UVpkUnNQMEVGMmFGc1ZzWWRtWm9HVFVCdwpQeE5HV1RvbXBmanBjU015OUw3Vm1KTyt2Y3dUWVVJOGZUdGFncWZkbHd6d29PeDRhR1BmbFlqV2J0N0V1TWtmCkpHSzc3R0x3TjVhdVJwWUJxdk1IRVdxa1h6Ukc0R1p0V08ycXFFVXhmZzhPZlZpOEZpSUVNM25zQjcrUDFEWWIKaDdQempHdkRVcWNLNnJ6VnJUdTV3NVpBeWJ0UHBwV0JUUXh4ZmhjNElEeDdlQmg2VHhHZ1pqZncKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlmVkZNUkJQbWN1OHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnNE56a3hOVEFlCkZ3MHlOakEwTWpJeE9UVTRNelJhRncweU9EQTJNakF4T1RVNE16VmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTRPRGM1TVRVd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFERVhMQW9odjR2aWhjTzBxU0h1VWNuSnR0b1lnSkswbGkxCjNDRDZZUG5xTGowOG5GQ3NSdVcxc3VUc2JuNVBoQ3NkS0hwOEVMN1REV2Nmb1VSVmw4OWlDZ296UWRua3dmOWoKa1hXV0toWENMN1dCQVhzWEgwODZyQUR2WnZKTm5jaU5WU0QzZTFQYkxmaVFDMVM1SVRRaUhlbEgzS3ByM2dmSgozTjhyZEZkNmF1SnRQYmlSQ2tLWlV4Q2kyMndFeVVuRnp3T3NyeHF0VVlGR1hqS2pPWDZTUTRmLzFkaGRyY0VyClBZLzhERzcvUCtUeloycCthRmVjYXpMRGUzSnZ3YXN0Uk9PNEd2QmJnZ0pZUldoVkxycFlMMSs1bnB6ckZiQmcKRjN4VTBQcFVEczhKeCtkSC9ZQVAvWGxZWTJGaTFFenV3NS9VVDVSRXNFNzdoTVFQcnhZUEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUUp4MW9uClFwdmxUOHZMcDRRb1ZMbE93SHc5OHpBZkJnTlZIU01FR0RBV2dCUUp4MW9uUXB2bFQ4dkxwNFFvVkxsT3dIdzkKOHpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW5UR1JVbHBmcUIyNFNyaXFtNElleG5uZEpaYWNYWThVWlVlTAovalN4cW9wNjFhK2VnRnBKcWJBbkJDR2VWQ09EZytoR1RsblQ2VmNSK3J5Sm1sM0tVcVpMNURoMFNtTzd3dWYxClRtVHJSYUNrL2dKZXRhRjdWU1NlcHdxZlRLeVRDUFNvSnhMVjlRcHFVSFBhU1RUaXZLUXlmYkZ0UTRyeWlodzkKQUo5MXZVWTNkTnYzcWY2QVRLN25qS3AxNnpqeWQrcGxib0trdno0ZTNHT0FMSHR3ZlVSQmFyVWdOV01ZYjF0SgprK3ArU2I5b0U5T1NVT3dDb1VITlhrbkNBWnVidm9KbXdoZXF2WEFZSE1Dd2t0a2E5MEw1Q1h4UFdrUjVOemNyCmxwT0hjOXU0cmtIT2dmV3FuS24yNDlOWE0vcjBOSEwwVlBlQ09FRUtWSEt4Uk9LRkZRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:58:51Z" service.beta.openshift.io/expiry: "2028-04-21T19:58:51Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 3f3c019e-e4a6-43f8-b9ea-fda48fc390a5 creationTimestamp: "2026-04-22T19:58:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"3f3c019e-e4a6-43f8-b9ea-fda48fc390a5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:58:51Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 3f3c019e-e4a6-43f8-b9ea-fda48fc390a5 resourceVersion: "7516" uid: 55b54439-2588-4d2e-89dd-e3cc9eecc7e4 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:58:45Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 5c0c6f48-1284-40e8-9b54-c44b0cfde609 service.beta.openshift.io/expiry: "2028-04-21T19:58:45Z" creationTimestamp: "2026-04-22T19:58:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"5c0c6f48-1284-40e8-9b54-c44b0cfde609"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:58:45Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 5c0c6f48-1284-40e8-9b54-c44b0cfde609 resourceVersion: "7362" uid: 4993ed42-b5c8-4741-aace-9c779018c697 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T19:54:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:54:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b01e1ed5-d78e-4418-9c35-eea9d5939826"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:54:38Z" name: operator-dockercfg-8l9nh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: b01e1ed5-d78e-4418-9c35-eea9d5939826 resourceVersion: "2987" uid: 65ca69f0-22f9-4718-92cb-81bffa3f8e05 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37140"