--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T14:11:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"862e693b-3e39-4eb8-846a-f20aa2998ca4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:49Z" name: builder-dockercfg-qjm5w namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 862e693b-3e39-4eb8-846a-f20aa2998ca4 resourceVersion: "4164" uid: 73118978-88fe-44b6-a047-29c796f7a7b2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T14:11:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0f34fc4d-599a-4f0b-a780-a656907a895f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:47Z" name: default-dockercfg-px4xp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0f34fc4d-599a-4f0b-a780-a656907a895f resourceVersion: "4050" uid: b0823ad5-1614-4e8b-a75e-b3e2a7d29d46 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T14:11:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"570e930d-95b7-4b1d-bb1b-d2e6d81263da"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:48Z" name: deployer-dockercfg-wrs89 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 570e930d-95b7-4b1d-bb1b-d2e6d81263da resourceVersion: "4162" uid: d84e6cfa-8520-4765-ba43-316a7bea0298 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T14:11:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"182a59fd-61f7-49e6-a2a9-a1d285e59b0e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:47Z" name: gather-dockercfg-t79qn namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 182a59fd-61f7-49e6-a2a9-a1d285e59b0e resourceVersion: "4052" uid: 61e74e24-b373-4caa-8c2a-5de073716a76 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T14:11:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a2612470-1e61-40df-a1fe-1a75de657773"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:48Z" name: insights-runtime-extractor-sa-dockercfg-4zp5l namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: a2612470-1e61-40df-a1fe-1a75de657773 resourceVersion: "4057" uid: 5422b242-f4bd-40a5-96f7-c5946a18ff20 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJQlpYcHFUYnY2RlF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzJOelEwTWpBZQpGdzB5TmpBME1qSXhOREUzTXpaYUZ3MHlPREEwTWpFeE5ERTNNemRhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFOQ3hpUm1YcWx0S0NHaE9zeTVVeVJjeTJyUzVLK2NtaFNQMmxNRVhhL3B3cDlWegplcGY0NkFncDhZempzNm9sS1RCZGh5aUlpME9TcnJZczJpdVQ4YkEvWExqOGttdmtHa0NFbzZkQ1F4NGFKMXlMCnRmcTZqcTNnNmRYdUVmVGRLQ2IxekhKMUZtMGVXdncvRkMvMzZhL0JCZmltVkwvZ2E4RTk4dm9FbWNJVGloSGYKWU0xK2orNWhvWEgvVjVEanp0TE1kM3I3TlFua2J3ZVViRmYrOUJvVU1wY2d4YUlBSzNQVmZybjdIdU44Z2NvUgpZZ0hzcFY5Uy9UMEI1NFJNL3FKdkc4RzQ1RFJOOGJuK3VMV3RuRjcrOG90VUlLSys3UVJ4eUljejFiME9McmQ1ClV3cDZDSVlxdGpxaFgzZEw4cElPaUFNMmx4ajQwODRYTjRxWTlDOENBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCUmtvbGFFbGZSbG5idnpIYk1FbGp2d3lLQ1Y3ekFmQmdOVkhTTUVHREFXZ0JSMGlwTGtyRUtOClh5R2ZyR3pvcVpoOFNHRkxFekNCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rWVdSak4yUmlZemt0TjJVME1DMDBOMlEwTFRobU5XVXRPVEpqWWpSaApZVE00TTJWbU1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQlpCMERMdTVFNDBYSEVOSGhQTllDVDlIdHpZVjkvCmZMZnZiWHRHSGR5TmVNV1h5SGVnVG0vK2NoR2VuN0FDS3JTY1lxN0V2YmUxL1dxbUMxVE8wNnIyRmFlcHZLSDUKK0ZRdDJGM29EM256K1AwdVo4RDFZcGpBVHFwVWZ6WURyT0dwQ0hHWkpHTkZjTGFtZkNOM0dvRWZHQmhqU3A4MAptQ0o2MnlZSTVuMFpYMkppckdRNzd3eFpSQWQxQ3NXNzFWVWg4bEpNRGRVdUJFbzFqRWZ6WU9mQmJMTU40S1ZSCkpGaEVEZHNYQUpIL0FFNi9TQ2s4V3UycEVmaTNKRmxzRUhzTlhHanBMZXBiWEJyc0RMeHoreWd2YUdyVS9PL3QKREpFY0szNUJyQldnY1V2Um1TWXFoTVI4aUV4N1VZckxJRFlDT2dTN1U1cTV3SmpjSUcwamZpME8KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlUTnczMHEzSFJFUXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnMk56UTBNakFlCkZ3MHlOakEwTWpJeE5ERTNNakphRncweU9EQTJNakF4TkRFM01qTmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTROamMwTkRJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFES2V3YW9sZ2xsYVlDRmpTenpMYUtHRStoaTcwc2x3dVJrCkVxZy9aVXNRNkpSM2tCdU9zMzVnWjlmQlMxM01kVkxFVlFFdTBucFN1L3Y3cEJDang0U050UTh3aURVN2c1a3cKRXBYeFdFU1Vjb2E0SFg0amdENU8yVHd0N2p4RTY2ZjBQRno1Y3JPOTRqZ0JFa1FMV05nelNMQUZEc2hscXpqNQpQaFpuR3BRK3J1R05sUGJLYlNqZjFvb0ZRZ3haOTVIdmNBbUdtMkN3SmRpTUh0V0lTeVI0ZWJaWUxZR2N3OUIzCmJsLyt3Q0ZDc3JleTF4MU81bHlOK241RTkvZU8rd1lWNGlLaG5CTnJSbHl3M3BqSkwyZlFYMTFpU25SMFZQSmIKdEg4WVA5ZXZuRG1ocWJTNTM3d1VjRmJOSU91UkljN1gxVDF6Unp5R2NscmRjZGNXMUNnQkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUjBpcExrCnJFS05YeUdmckd6b3FaaDhTR0ZMRXpBZkJnTlZIU01FR0RBV2dCUjBpcExrckVLTlh5R2ZyR3pvcVpoOFNHRkwKRXpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWJBTnRyNHlOSjFOc0VoSHBXeCsvd2FueitQOWlQMEF4YWpJQgovTWRsWGdxYWl4TnBXajJ5ellvd2I1OHp2alI0RzlibytBV1BOSUYwY2Nzd1FsdXM4SXBVTXQ4V1R2YjVSWGYyCnZCYnFSbEx4Y2VZSGZtL0swU1pJc2k1K0s4QVZTdnN0eVg5NjRmNGp5d3plejdWNno1ZU5WNUk0SWtMSnJrV0UKZHFONjJjeGo1WVo4SkptUmtTRUtSUStVNk1lNVFuU1lSMXI1dEpwaHdNMU80MXJHMUo4UXpMbXBrVFRwYlpTMwpybzlKV2YwcUo2NCthL0MxZEsvOXZsNEFRZldyUkNjY3N6dktVSEZKa1hVVmEyT3hrK2NHMVdxTlJSa1NnMEJWClhZNjQ5RzZaVStYNTRUek8zcnd6aHMxUkY2YUNwNmtOZzVCNTM0NWt4MDdvaUUyMWtBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T14:17:37Z" service.beta.openshift.io/expiry: "2028-04-21T14:17:37Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: adc7dbc9-7e40-47d4-8f5e-92cb4aa383ef creationTimestamp: "2026-04-22T14:17:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"adc7dbc9-7e40-47d4-8f5e-92cb4aa383ef"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T14:17:38Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: adc7dbc9-7e40-47d4-8f5e-92cb4aa383ef resourceVersion: "8057" uid: 84977c06-82f2-4398-ab55-a7df3d2b0f3d type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T14:17:31Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 3c66dcd5-3f90-402a-bc2b-4d580382034f service.beta.openshift.io/expiry: "2028-04-21T14:17:31Z" creationTimestamp: "2026-04-22T14:17:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"3c66dcd5-3f90-402a-bc2b-4d580382034f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T14:17:32Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 3c66dcd5-3f90-402a-bc2b-4d580382034f resourceVersion: "7931" uid: 21aa04b3-d6b1-4df2-ae95-20ecf4525e7d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T14:11:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"33137f6d-85e7-41f2-8d13-150c13b22a8d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:11:48Z" name: operator-dockercfg-wp27l namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 33137f6d-85e7-41f2-8d13-150c13b22a8d resourceVersion: "4056" uid: 6c36547e-95d7-4fd7-ab72-1c321137c5f5 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "38825"