--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T14:20:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"920d595d-09f6-489b-b800-1701d1e8927b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:58Z" name: builder-dockercfg-h4cdj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 920d595d-09f6-489b-b800-1701d1e8927b resourceVersion: "26188" uid: f5efaf27-6987-4b47-8f2a-6a2eed08844a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T14:20:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ebe42b48-e1c0-4fd4-82e6-629cc846cfdd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: default-dockercfg-rlcmx namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ebe42b48-e1c0-4fd4-82e6-629cc846cfdd resourceVersion: "26112" uid: 6f982216-6adb-4872-acb3-e780eacc6068 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T14:20:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f22260f1-a307-4acb-ab67-ce986966d8ad"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:24Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:58Z" name: deployer-dockercfg-98r5t namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: f22260f1-a307-4acb-ab67-ce986966d8ad resourceVersion: "26184" uid: 39542ab7-db1b-44f2-8640-bc36b4a800a8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-24T14:20:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f7afc35-d68e-4fa1-ad6a-e057ee40312d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: gather-dockercfg-kzpxt namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 9f7afc35-d68e-4fa1-ad6a-e057ee40312d resourceVersion: "26049" uid: 9ee47655-f494-4085-a91b-4157d815cb49 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-24T14:20:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"032e317d-a066-4c41-8242-e587dd4b4470"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: insights-runtime-extractor-sa-dockercfg-jk68x namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 032e317d-a066-4c41-8242-e587dd4b4470 resourceVersion: "26063" uid: 0b34c1ea-ece9-4fc3-88ca-75c874300ac5 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:26:08Z" service.beta.openshift.io/expiry: "2028-04-23T14:26:08Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 464dda9b-f339-418b-a7fb-6c1c5d9fb91b creationTimestamp: "2026-04-24T14:26:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"464dda9b-f339-418b-a7fb-6c1c5d9fb91b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:26:09Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 464dda9b-f339-418b-a7fb-6c1c5d9fb91b resourceVersion: "7779" uid: 2261e429-e261-4c01-83ce-58a94a57d0cf type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:26:03Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 59f3ab71-8921-4084-95f4-0c420cf2e87a service.beta.openshift.io/expiry: "2028-04-23T14:26:03Z" creationTimestamp: "2026-04-24T14:26:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"59f3ab71-8921-4084-95f4-0c420cf2e87a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:26:03Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 59f3ab71-8921-4084-95f4-0c420cf2e87a resourceVersion: "7660" uid: 4d086f57-da54-4ed4-8fab-2b24afaa6da7 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-24T14:20:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3a6ef730-e21a-4bdd-97cb-1f21e6edd533"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:56Z" name: operator-dockercfg-zpwgk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 3a6ef730-e21a-4bdd-97cb-1f21e6edd533 resourceVersion: "25977" uid: 8e147ad6-07a5-420d-b5a4-4a4d87f76ae3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "33189"