--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T14:20:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"830e47e4-fbb7-4307-8ca6-274467122642"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:43Z" name: builder-dockercfg-nrw8j namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 830e47e4-fbb7-4307-8ca6-274467122642 resourceVersion: "37547" uid: 0ea59559-3046-4d91-9532-58a491e591f1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T14:20:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c048c84-f3ee-4159-b554-d06c7ab51ddc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:38Z" name: default-dockercfg-vqzw7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5c048c84-f3ee-4159-b554-d06c7ab51ddc resourceVersion: "37357" uid: 1284bf72-4e4b-46e9-a51c-562da701e28c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T14:20:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"50b19052-8f42-42cc-8425-1c2741e1795a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:42Z" name: deployer-dockercfg-sxjn5 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 50b19052-8f42-42cc-8425-1c2741e1795a resourceVersion: "37514" uid: 5d1c285b-464a-49d4-ae17-ae1755e88cad type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-24T14:20:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f4f00b5d-857b-4448-8a82-8e772333a824"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:38Z" name: gather-dockercfg-nljp4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: f4f00b5d-857b-4448-8a82-8e772333a824 resourceVersion: "37369" uid: 6e57d89c-1147-4e91-a8e2-16cee15e75ae type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-24T14:20:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b9265fb5-642d-4b90-80e9-24f1dbdb86fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:38Z" name: insights-runtime-extractor-sa-dockercfg-zf9np namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: b9265fb5-642d-4b90-80e9-24f1dbdb86fd resourceVersion: "37363" uid: 3c1b9731-3568-4b6d-ad83-9dca65fcb9c4 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJRG9lNnM5ajZUOUV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM056QTBNRGM0TkRBZQpGdzB5TmpBME1qUXhOREkyTXpaYUZ3MHlPREEwTWpNeE5ESTJNemRhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFMeGNLeXdqVGZnM0hyOUNMZjFKelF2cnAyRExzTTdxY0pISXVqUzByVzlJNlBLUwo3QWVTRTNldmlUMUxodkd4VmxCcE11S2djMXJnSVhNQlB3Z2VUUDN1WkNDYkluNlRjZjJ5SXNaTldFbk1SdEd5CjdOYjQzRnR3VTlubkRMcHR6dnJ4N3VMaWsyTnpVZHY0M2hhekVSTFFoQUlMTTd1YitvMkxYN1licjBNZ1ZXbVQKOUJuU0JJWHorMWc2c0VUVWdQU1lwVGdZbncxa1l4VGd4UWZZSkZSckYwV2JML1NCVmJZeXBBbE9IVi84aUwrSQpzNnQwVVphZ1pIVGtJWjlSTDVMWk5vbDBibEwvTDR6SUdja1lnVmExVU5UVHRERUJTVit5WUZDSit6alpZaHVpClN6RkRMRXIrMks2R2ZuMmkvS2xRRCtCbHQwTVJtMmhqOHFnTnZRTUNBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCVGc5WnJockJKMG5ZSmd0M2t6NWlCNEFxTG5TREFmQmdOVkhTTUVHREFXZ0JUb2NudEZldWlLCjFjQ1dhSE1ER0pyRENwU0hHRENCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rTkRabVpqUmtNbVF0TVdVeFlpMDBNREJoTFRrNU1XTXROakV6WldWbApNRE01TW1RNU1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQmNJQmVzZ3AxQWRwcUhVZHdCN050MzN6cDVkWi8zCjBGNDJpSUR4Vmx2OE5tYzE5MTdRYW9LVVNHR0lXai9kYm4zVHhndDduRkRka3RKK2ZwT1V4QUNpR2gxVGF4S3YKSzNFcEFnRCtQNGdheElVeUZ1QWZoWXVsOS9lU2g2bE1CSTRuK2V6T2IvMFNGNjFBMDhSeDdEUnJlQlhHeURlUApQU0dXd3dTWGJTQlp5NFZBeEdxUjJNOVVORlpYZThHSTZueUV4WTBLVmtFMUtoZWdDcThJclNGY0RaSTBBTDg5CklqUzRNSDQ4a3o2cUFJSXh1d0l4TWJQMFZxYVRJbjMzL1IraEg4N28wdXgxK0wzMkJiNTVjOHpPbStxS0o1Nk0KQTNXeUtyRHZsNFZWaHQxMnIwR3VUVFk0dnZHSU1RUnRtQ3YzRTc3ZlBqdnJqWDR6bDlCcmo3T0YKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlVZGIyK2ZNRUczc3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTnpBME1EYzROREFlCkZ3MHlOakEwTWpReE5ESTJNak5hRncweU9EQTJNakl4TkRJMk1qUmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056Y3dOREEzT0RRd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEZlZaM2s3NEVyZmhESXBhTEF6ejdrU0JON1pKMVZORjFhCm9lOXBZZnNRcGRnMDRwSWxGelo0ZHlSQlc5RWxSNm5ZM2JOanlCVitBZU8vUnhkT3hnZ2k3c3NsbnRzT0I3WUEKWUtlRmNPa0FiMUtnb2lVR05nSThVN2xodnNMQm1qQUtaSkQzOXI0aGJDTGZxOEIybDNzVmlQOGtRUDhoK3poMAoyVnBrNzRIbHQwbWJPQjgxeE1FS0phL2FaVGdveWQwTVNIbklMMWtHdGJrMW1QaFFuM083MGlQYTljQzV4R01ICkRVUG5XQy9WeUhVQmE0WStsTVI5QUZ2RmJvYUlXUlpjdDN4MU9KdGFDZGZVU1c0UzhoWFJUaC91endjY0dHckQKMzNMMisxWHFXa2RBWldKbXp1WkU1N25vVlFUbkphYWtReUxqcGZQOXhYeWlNbEFsSm5ScEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVG9jbnRGCmV1aUsxY0NXYUhNREdKckRDcFNIR0RBZkJnTlZIU01FR0RBV2dCVG9jbnRGZXVpSzFjQ1dhSE1ER0pyRENwU0gKR0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWJicHpRc1RxUGJJeTdxSWRHSDZJOWdDVHRmZGx2a0ovbzExRgprcFVqaExKNVFXeDU2SkY0ZE1wdnRVeFBHbWtZUnJ1T0hVMUYrdGZrYlpaTDQ2VS9EWTJCb1lCcUY1dEtqQlJQCkVsL0xEYUhlQzRRZVBGUDVMeUhxdVNackRsKzRyeEJuUVlMaXdKUW44NWhIanNhY1cxS1NIdGwzZ1RQbmRsaVkKdytQN0FzQXNzYm93SGV4TmpTcklIaHg3Yk5OclVnM013QksvMldsb1ZMaVdtRWMzM2t0UzNkNEFuTXVxSDVOaAprclJBSHpOaFRteWFCQVdBU0tHZ3BaTldDK1JUL2VWcFpaWVNIUXdYNlI5UVM0V2NDVHhmblh1VWkvWDMyeUg5Cjg0dkhqeFo3M0l4dzFrbkhCZXVpc0lUTmZuOTBsTG8zeW9EUmJTWDNIZlpOV20wbnBnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:26:37Z" service.beta.openshift.io/expiry: "2028-04-23T14:26:37Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 46ff4d2d-1e1b-400a-991c-613eee0392d9 creationTimestamp: "2026-04-24T14:26:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"46ff4d2d-1e1b-400a-991c-613eee0392d9"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:26:37Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 46ff4d2d-1e1b-400a-991c-613eee0392d9 resourceVersion: "7925" uid: 16142dd0-c134-4c96-8029-9bb8eb4499ad type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:26:31Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 12b8f04d-b74f-4dcf-b5e1-de60ab6480e5 service.beta.openshift.io/expiry: "2028-04-23T14:26:31Z" creationTimestamp: "2026-04-24T14:26:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"12b8f04d-b74f-4dcf-b5e1-de60ab6480e5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:26:32Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 12b8f04d-b74f-4dcf-b5e1-de60ab6480e5 resourceVersion: "7780" uid: 3067e8ed-44da-4c6b-9f53-2b9adc711853 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-24T14:20:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"462d1ffe-3ef6-44f4-97e9-0357a0743c7e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:38Z" name: operator-dockercfg-cjwbh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 462d1ffe-3ef6-44f4-97e9-0357a0743c7e resourceVersion: "37365" uid: d598c9f2-07ea-4d89-81e3-4bc70b4ec609 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "44283"