--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T13:29:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9af4b8bc-1a1c-4650-99a1-0969d794327f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:08Z" name: builder-dockercfg-r75pz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9af4b8bc-1a1c-4650-99a1-0969d794327f resourceVersion: "26233" uid: 56dc2b79-403a-491b-992b-b2b6df1536b3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T13:29:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c3773bf-1cad-4424-b379-5b6f3592c987"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:03Z" name: default-dockercfg-gsg9p namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 8c3773bf-1cad-4424-b379-5b6f3592c987 resourceVersion: "26060" uid: 4924a58a-d8df-4de2-ac76-80db4741eb91 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T13:29:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7451e7af-3881-474a-90e5-8c2324d689c4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:08Z" name: deployer-dockercfg-t8lz6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7451e7af-3881-474a-90e5-8c2324d689c4 resourceVersion: "26224" uid: 4a0342de-210d-4a47-a22b-ae4fe7da413d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-23T13:29:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"71779b25-f644-4785-b030-2248e53227b1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:03Z" name: gather-dockercfg-m5r47 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 71779b25-f644-4785-b030-2248e53227b1 resourceVersion: "26056" uid: 5f065b77-e7c2-4e4f-a27d-a98ed8e32d11 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-23T13:29:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"869446e5-2179-4c3f-8870-e0d412ba50f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:03Z" name: insights-runtime-extractor-sa-dockercfg-hkznh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 869446e5-2179-4c3f-8870-e0d412ba50f2 resourceVersion: "26050" uid: 7d2b63c4-c013-4b2d-84c2-7d075d522621 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T13:34:25Z" service.beta.openshift.io/expiry: "2028-04-22T13:34:25Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 2d8b04a6-bde2-4a15-8d10-3c65fd36b4e3 creationTimestamp: "2026-04-23T13:34:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2d8b04a6-bde2-4a15-8d10-3c65fd36b4e3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T13:34:26Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 2d8b04a6-bde2-4a15-8d10-3c65fd36b4e3 resourceVersion: "7803" uid: bdb0dbf4-0115-43c1-abf0-ad44d2c631b5 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T13:34:20Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 66e71a48-2cdc-4310-8d97-7e4e6f7f09ba service.beta.openshift.io/expiry: "2028-04-22T13:34:20Z" creationTimestamp: "2026-04-23T13:34:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"66e71a48-2cdc-4310-8d97-7e4e6f7f09ba"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T13:34:21Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 66e71a48-2cdc-4310-8d97-7e4e6f7f09ba resourceVersion: "7694" uid: b330a447-2797-4e2f-89fb-de4c1aff1982 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-23T13:29:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b57e5bc6-b303-4cc5-a155-ceb04e38956f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T13:29:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T14:05:03Z" name: operator-dockercfg-4fk8w namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: b57e5bc6-b303-4cc5-a155-ceb04e38956f resourceVersion: "26067" uid: ac3c1d73-0f79-4bb8-a3d0-36c045b6e195 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33506"