--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T19:50:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"303d0078-3da5-4931-807c-03ce3eee1b42"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:45Z" name: builder-dockercfg-xkjx7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 303d0078-3da5-4931-807c-03ce3eee1b42 resourceVersion: "26347" uid: 32e4f19f-acb2-4552-b115-29e07f8ad104 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T19:50:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e63ca836-0912-4c17-b832-705041527613"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:43Z" name: default-dockercfg-ch44p namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e63ca836-0912-4c17-b832-705041527613 resourceVersion: "26125" uid: 43f5f826-6cc8-4cc7-af0d-f1098206016a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T19:50:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ca8c9db6-a489-4879-bff8-f794fbaea844"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:45Z" name: deployer-dockercfg-nvmxd namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ca8c9db6-a489-4879-bff8-f794fbaea844 resourceVersion: "26318" uid: 5163f8d1-2cba-4cf7-95ad-c652189b91ed type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T19:50:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"94e8c9f9-b534-495e-8927-344cd7e19c01"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:43Z" name: gather-dockercfg-nqfjb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 94e8c9f9-b534-495e-8927-344cd7e19c01 resourceVersion: "26194" uid: bd57c13b-5cd5-4b7a-b2bc-57ce830037da type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T19:50:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ce8f6948-8228-467e-9cb7-edbd4392be94"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:43Z" name: insights-runtime-extractor-sa-dockercfg-676kc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: ce8f6948-8228-467e-9cb7-edbd4392be94 resourceVersion: "26159" uid: 05aea7eb-0d43-4842-9cc2-ed593309f6c9 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSVENDQXkyZ0F3SUJBZ0lIYzVJSFI1OU1EakFOQmdrcWhraUc5dzBCQVFzRkFEQTJNVFF3TWdZRFZRUUQKREN0dmNHVnVjMmhwWm5RdGMyVnlkbWxqWlMxelpYSjJhVzVuTFhOcFoyNWxja0F4TnpjMk16WTVNalk0TUI0WApEVEkyTURReE5qRTVOVFEwTVZvWERUSTRNRFF4TlRFNU5UUTBNbG93TERFcU1DZ0dBMVVFQXd3aEtpNWxlSEJ2CmNuUmxjaTV2Y0dWdWMyaHBablF0YVc1emFXZG9kSE11YzNaak1JSUJJakFOQmdrcWhraUc5dzBCQVFFRkFBT0MKQVE4QU1JSUJDZ0tDQVFFQXVIa0V1S1dDZlM5aDhPS2lKMGxFT1JRT3lvZVdmeHVSbXBvQnR0cmQ1MlYyM3Q5agoxbloyRTNPcmYxaUFsbXZ2TWVpYWF3MFpZOXRZYVJFQlNIaktwUUV4aXN0THlQTDZOTXVVM2tZbnJ1UXgyaFJ3Ck5pQzN4N25SWW9aR0lJbldNQjFENHpEVUVBYmdEWEd1U2hYYTI0ay9NeXUwM0F4U2xhcWVacE5oVFByNkhRckoKNmFlRm5zVUhhLzlpc0k2SnRudk1lMUpiTlJHbkVzL25rNkNTSXIzcmt5VWg0bDBNLzdBWGkrOXpLNGU0WUNzTwoyMmFTVDJHWkIxaGJxVWRhQ0w0STFaN0REOWR4ZE9iK0JrSFBOYzRPcEFLVXM5TmVVS0k5ZFkwc0V4TjFZODJrClZMdGxOdUVONERKS2NxZzk4TkpTTGcyS0loSitPNDBZNjlxYWVRSURBUUFCbzRJQllEQ0NBVnd3RGdZRFZSMFAKQVFIL0JBUURBZ1dnTUJNR0ExVWRKUVFNTUFvR0NDc0dBUVVGQndNQk1Bd0dBMVVkRXdFQi93UUNNQUF3SFFZRApWUjBPQkJZRUZGMUVtaG82VFFmdWxabXZhZHgvOW9SUHBNSWFNQjhHQTFVZEl3UVlNQmFBRkUvOXVCb2JRaHpHCmJnSW82dDg2MFlEMnFQTkNNSUd2QmdOVkhSRUVnYWN3Z2FTQ0lTb3VaWGh3YjNKMFpYSXViM0JsYm5Ob2FXWjAKTFdsdWMybG5hSFJ6TG5OMlk0SXZLaTVsZUhCdmNuUmxjaTV2Y0dWdWMyaHBablF0YVc1emFXZG9kSE11YzNaagpMbU5zZFhOMFpYSXViRzlqWVd5Q0gyVjRjRzl5ZEdWeUxtOXdaVzV6YUdsbWRDMXBibk5wWjJoMGN5NXpkbU9DCkxXVjRjRzl5ZEdWeUxtOXdaVzV6YUdsbWRDMXBibk5wWjJoMGN5NXpkbU11WTJ4MWMzUmxjaTVzYjJOaGJEQTEKQmdzckJnRUVBWklJRVdRQ0FRUW1FeVF5T1RJMlpUaGpaUzAwTnpZMkxUUXdaakF0T0RreE1TMDFOemc1WmpVNQpNMlUwT1RZd0RRWUpLb1pJaHZjTkFRRUxCUUFEZ2dFQkFEQ3dtNHJlQmRPS2lQdjZVWGk5eXR5VVFBRW5Ua3hkCjNUS0VEaDdaNVhaSHNFcFl2cld0eWowa08xaVUwSkhqZVliSXdScG42V2p1SzV0azkrT2xkcjkrdzdybDJaaTEKR01tcDVzMU9OWjBoTDRHRjdUZGlxT2FoU2d2MGNMbzlmK1FtRFVvdS9OWjg1ZkRNZGJoQzN2MVRNa2JyUlNjTwpMb1VIUnJmWitZZVVPLzJpZlYxSG00NjJtYUhFOThQTDRIVk93akhpcjdtMi9IWi8vR2oxOWRIcGc0MlRkQjluCm9zME9yak5yNXdNVnphYUd6WjhpQ3JjR3VGcUV4cTRqZFdpalJNVlhrWEFhV1RvSEoxdTVaRFhERzEwTjVYcVUKVEtXYUdTczVUbXJ5NDMvUlV6bXpVU3J2NWRORXVKRWRzRjdRdXVxUlRpVHlEc0k1UldUdnVVdz0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlEQkt5cFdHV28ySXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNMk9USTJPREFlCkZ3MHlOakEwTVRZeE9UVTBNamRhRncweU9EQTJNVFF4T1RVME1qaGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpOamt5Tmpnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEZmVrazVlSk9IU3RVaERkVUdURzFBOGxYa1dZTWtseHJUCkhITWk2OUwwWTRmWWNuWk5UNlNPMlVqY3hmbXhqUXB6ZzViZVJLT29kRUZ0L0xmekJic215UEd3RlBNTlZqRGYKa0lkQm42L09haitaOHQ3RVRiRGpNMUJnUVpSemxjQU4wb0VSZmZqVUhZTVhYbzdTSHpxMmpRVmtBcGtoWU94dwo0SVZqazlGMis4aVJaWU5GNUMzUk5PUHdkdnQ0TjFkYnU2ckFLMU1hazlacUVsTmU4WWt1UjhObjQ2aG1PRFQzClowZE9QeWZqSEZUZVozYlMxZGdvaUo0RTI4RjRBUlZ4Z3J2SXVQejdZTnArV3ZneWtQWkJyYitlTE5UQWU1UysKMWlhSzlQcUlvY1ZEN3RTRTVkYytpcGsrRkl1eFBBTEJxV0t3c0NMdVkxekxvbGZxa3E0REFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUlAvYmdhCkcwSWN4bTRDS09yZk90R0E5cWp6UWpBZkJnTlZIU01FR0RBV2dCUlAvYmdhRzBJY3htNENLT3JmT3RHQTlxanoKUWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWdpMEZvTmNNOFdabExORU1yTXczdTFZVEVDZnZpaFBvNTBESgpZTUt6cHB6WklZcWZyUklUSGNhSjYvQmJ5aGxXRDFTRGU1QzNUNlRKMUlzLzJseFhLRU16OExVRGpVS0JNMVE3CmNIdTNSemlzb2ZDSGJ5Y0RSdXpnZXQrMktCdUZ0dVhKZk5kL1FBM2drVEtSRk1jeEtxcndmUjdHc3BIeHBFNEIKWTNGU3dKMWZ3MmV5MDZ4TW1QazhjTmIxVStlK0huS0g5Z0FucUxhMjRmVFpvWkEzMG9welE3dmRzMEZTWmJtaQo5a1pURnZQWjh5TDd4aHRXamlIREd5bnU0elMzUjZzSmFpUnRaQ3h3bVZyenBxaS8rSkNYblFDSy9qOUdVWEprCmtSYUFKMiszV1gxRkdrU3M0cHhWR21XWUZlR1VBSVBCb04yUi9jaENEcTlCQVViSDhnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:54:42Z" service.beta.openshift.io/expiry: "2028-04-15T19:54:42Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 2926e8ce-4766-40f0-8911-5789f593e496 creationTimestamp: "2026-04-16T19:54:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"2926e8ce-4766-40f0-8911-5789f593e496"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:54:42Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 2926e8ce-4766-40f0-8911-5789f593e496 resourceVersion: "6958" uid: b012862f-3b0b-40e3-811e-74ec14b328fb type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:54:35Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 259450fd-cde6-42e9-a292-e91b0ecd5378 service.beta.openshift.io/expiry: "2028-04-15T19:54:35Z" creationTimestamp: "2026-04-16T19:54:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"259450fd-cde6-42e9-a292-e91b0ecd5378"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:54:36Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 259450fd-cde6-42e9-a292-e91b0ecd5378 resourceVersion: "6862" uid: 0bf9846e-04d4-4445-80f3-86df67f46df1 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T19:50:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c4b4054a-68b6-4a72-8d33-08a9a01dab7e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:43Z" name: operator-dockercfg-gmntr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: c4b4054a-68b6-4a72-8d33-08a9a01dab7e resourceVersion: "26160" uid: d28a9549-2515-4c12-8296-82431e7ba7ad type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "32632"