--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T19:51:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e5ca0d92-5a74-4cbc-9898-7b20bb4c25bc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:51:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:27:02Z" name: builder-dockercfg-cn26s namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e5ca0d92-5a74-4cbc-9898-7b20bb4c25bc resourceVersion: "25906" uid: 2346ffb2-2318-410c-9943-0efb33f59be0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T19:50:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"58ba0414-a98e-4575-9f6e-33c1fdd80cc8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:58Z" name: default-dockercfg-vm2x8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 58ba0414-a98e-4575-9f6e-33c1fdd80cc8 resourceVersion: "25778" uid: 1c594006-235f-4e78-8ab3-989a4c4809ad type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T19:51:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3a655b9e-6849-47c5-a137-ff301b7f1ad6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:51:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:27:02Z" name: deployer-dockercfg-q5kz9 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3a655b9e-6849-47c5-a137-ff301b7f1ad6 resourceVersion: "25908" uid: 10d1953a-0d50-414b-8110-5eb2f379d922 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T19:50:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8362bc3c-4182-48a5-892b-f0c718cf456e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:58Z" name: gather-dockercfg-nhcsv namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 8362bc3c-4182-48a5-892b-f0c718cf456e resourceVersion: "25784" uid: 246dcfd7-29fe-4794-ab1d-0689217954e6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T19:50:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6d1d4dff-ead1-41d7-8c64-861adbe7001c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:58Z" name: insights-runtime-extractor-sa-dockercfg-8tkc8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 6d1d4dff-ead1-41d7-8c64-861adbe7001c resourceVersion: "25780" uid: df06cd5e-58fe-48da-85b6-5ce0ec66e119 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:54:28Z" service.beta.openshift.io/expiry: "2028-04-15T19:54:28Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 5f3bd6fd-c446-43c3-802d-91fc3bbec48f creationTimestamp: "2026-04-16T19:54:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5f3bd6fd-c446-43c3-802d-91fc3bbec48f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:54:29Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 5f3bd6fd-c446-43c3-802d-91fc3bbec48f resourceVersion: "7124" uid: 30f6130e-dab2-4424-b2e5-6951369ed5d4 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:54:29Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: bda08a16-3de0-45d1-988e-b223186628fc service.beta.openshift.io/expiry: "2028-04-15T19:54:29Z" creationTimestamp: "2026-04-16T19:54:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"bda08a16-3de0-45d1-988e-b223186628fc"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:54:30Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: bda08a16-3de0-45d1-988e-b223186628fc resourceVersion: "7128" uid: b6f04a2e-8624-4496-8a0b-2fefc841e4db type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T19:50:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f837ed7-ba92-429c-bdc1-12f7b9c26f96"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:50:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:26:58Z" name: operator-dockercfg-v7txp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 7f837ed7-ba92-429c-bdc1-12f7b9c26f96 resourceVersion: "25783" uid: 9acab23f-9469-49b3-b108-95408dcbaa7a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41680"