--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T14:20:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"38bc2422-eb4b-4373-b642-e664f4a0781d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:57Z" name: builder-dockercfg-vccph namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 38bc2422-eb4b-4373-b642-e664f4a0781d resourceVersion: "25790" uid: 923acf17-ffe3-4c63-ab13-0d6b5472123f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T14:20:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"60113224-9cd7-40eb-95b6-5df95f7d1c0e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:53Z" name: default-dockercfg-bbs7j namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 60113224-9cd7-40eb-95b6-5df95f7d1c0e resourceVersion: "25666" uid: 6f8af856-5ad0-4118-b338-15fe87da071c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T14:20:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6c73e18c-b33d-408c-af59-a2331126d241"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:57Z" name: deployer-dockercfg-j4p6l namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 6c73e18c-b33d-408c-af59-a2331126d241 resourceVersion: "25777" uid: d0d3b95a-2f43-43ca-a0f5-bd1ef250b4ae type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-24T14:20:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6392a3cb-dfb0-4c8a-945a-b7ab552c415e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:53Z" name: gather-dockercfg-vmls2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 6392a3cb-dfb0-4c8a-945a-b7ab552c415e resourceVersion: "25648" uid: 84fba7fd-25ce-4bc6-8541-a7d76cf4f14a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-24T14:20:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e8620a64-509c-4d8d-ba3a-da74796bcfbb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:53Z" name: insights-runtime-extractor-sa-dockercfg-gwkgg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: e8620a64-509c-4d8d-ba3a-da74796bcfbb resourceVersion: "25659" uid: 71b33f7c-4fa8-493a-8770-df2ae05f9f06 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:24:47Z" service.beta.openshift.io/expiry: "2028-04-23T14:24:47Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 4869ff3c-c8cd-4841-8ad8-5115b73d3ec5 creationTimestamp: "2026-04-24T14:24:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4869ff3c-c8cd-4841-8ad8-5115b73d3ec5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:24:47Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 4869ff3c-c8cd-4841-8ad8-5115b73d3ec5 resourceVersion: "7668" uid: c9ef2b8b-9d15-465d-8a92-0318545e1f6b type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:24:26Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 731d9852-ffaf-42ed-b0d9-560d2c153ee4 service.beta.openshift.io/expiry: "2028-04-23T14:24:26Z" creationTimestamp: "2026-04-24T14:24:27Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"731d9852-ffaf-42ed-b0d9-560d2c153ee4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:24:27Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 731d9852-ffaf-42ed-b0d9-560d2c153ee4 resourceVersion: "6835" uid: 2f9cbf07-038b-4ee6-be99-4b76d249bf87 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-24T14:20:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a65bf166-91f1-47be-8adc-293a8b5530f9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:53Z" name: operator-dockercfg-9fmsb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: a65bf166-91f1-47be-8adc-293a8b5530f9 resourceVersion: "25654" uid: 604e6407-2aa9-4cf2-b6be-0419201cd92b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41722"