--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T14:12:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"30b1c066-e929-468a-b76e-df5074065b21"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:12:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:12Z" name: builder-dockercfg-vn86l namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 30b1c066-e929-468a-b76e-df5074065b21 resourceVersion: "3999" uid: b0370621-15fe-4302-95bd-209bafe6506d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T14:11:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"846563c4-d15c-43ce-bf94-ad54c344f7e7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:10Z" name: default-dockercfg-mtmw7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 846563c4-d15c-43ce-bf94-ad54c344f7e7 resourceVersion: "3843" uid: 261dcab6-f6ff-402d-bf25-7be401557dae type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T14:12:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4aa52708-0483-4785-adab-a6a6eb6483a8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:12:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:12Z" name: deployer-dockercfg-lrpnd namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4aa52708-0483-4785-adab-a6a6eb6483a8 resourceVersion: "3998" uid: 49eeed9a-2611-427c-b876-22d1f21c0552 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T14:11:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d97c4121-e8ab-4c62-b1f3-1b9a88904791"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:10Z" name: gather-dockercfg-7xzkn namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: d97c4121-e8ab-4c62-b1f3-1b9a88904791 resourceVersion: "3844" uid: 5eae839d-4ccf-4dc7-975d-5c043c8f8a49 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T14:11:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dad3c3c1-e1f7-4149-8e18-f4668a521936"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:10Z" name: insights-runtime-extractor-sa-dockercfg-7qqgh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: dad3c3c1-e1f7-4149-8e18-f4668a521936 resourceVersion: "3846" uid: c0de6864-883b-4342-9e50-85ca5538d7e6 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJWnFGbnUySXdaaTB3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzJOelEyTmpBZQpGdzB5TmpBME1qSXhOREUzTlRsYUZ3MHlPREEwTWpFeE5ERTRNREJhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFQYWludW9oNUJoS0xuNTYrNE5rTzZ2ZUlyVEFpYTlEeGV1RTNIam1OUWRzWjJuMApPZE5sVFBZM0N5b3l6UjdqOE1yN0JBb2RlY0hVK0hMQ1FzdUR1amhOaVU5MjJUK0dUdFlmVklMQm5pajdEb2JzClBZSDV1dFZnM3dtTXRnQWFhZjJwZ2FMMHpLd1lNeFNseGd4TmR4emw4ZDR4QU0xckpOdFpOeXJwOVJJV2JLMUkKZWlWWHZLODQ0ZXM5NzY3S3BlM2pBMkhNSjhaVkRidjZiRjIvcUVmdTJPV2N1SzBXTzd1K1pnSmI1WTFWYVY0aQowQWJrTzBaaVMyMVdzQ2NWQURnM0pjREhJT2lWMEFoeXpvNXZIaUg5UGM3dDFLc0Y2NzA3M3NQc05NOXgwZXVUCkVHQ3hoM0hvRjRpRjNoSmdxY1VwZ0MyajZDZGdZdWNpREJYYmNRRUNBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCU3FielYveE5YR3hhU3pDTG52Q0dxWUNDR2QrVEFmQmdOVkhTTUVHREFXZ0JSWDBxdG1nbVdDCkFLWW4xN0lvQ1lOd0JtbGZ2RENCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rWVRNeVpXWTNaVEF0TnpreE5DMDBabUZoTFRnelpHWXRZV00wTVRnNQpaR00wTm1KaU1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQzlEd05GeEptMndyY2hyV3ZMOVhQbjhMZ2s3ajB5CmlwbUtrWTdOWEJJSmc3cDJEcXJidXhvbzhJZnNZZHBXUmxKOEsrR0tYdFBmUWp3SFVqSjlBUnk1YW1oaU9ZdXgKam9PK2U3N0VTNHpBYzY0TXZpd1U4LzQxVXhHTVVtRUh3RWFRTzd3V0dYTE1YandYb3BFQ1hBcnB5alBGM2NTUQpMbWRpN21vQWdMT25YVG9vaDYrcytnRGNSZTZYV0xoSVdiRVhjK1A3Zy9CcGE5dDVCMHBxNXR0QWt6K2pzdGNhClUrL0xsWU9EcHRNMnFQTWsrNCtVeGtBYlBPMko2RS84blRBVVhBeWIvd2xZSGVTcDhjRUNNM1dLNWZBeGZQTUcKYlJ4dElzV2dtcjRvSnNZeEJ4OFdFRmI3RVBibVdSTzNyVUVWLzBFdmV6UFowZDQ3RHFxMEZtTWEKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlTZDU1aUxkcXpRNHdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnMk56UTJOakFlCkZ3MHlOakEwTWpJeE5ERTNORFZhRncweU9EQTJNakF4TkRFM05EWmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTROamMwTmpZd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEZ1FBdWpCYVkzNjRVRGJXUk5tRUlpM2tYeVROdzU1eW1vCjVwUlNZY3VYNFZmdEc1WjdOR3Vra2lFeGxVL3FBNnpuTmV3dWRjL2UxNGwwQUl6M0VIdWFZWVNaMGxacUJycTIKK0RsMDEzZnYwUmhUYlQweWVGREoxT1N5SGR1ZEo2VERzNVJtd1JMeHJ6czlMcG1ESWtVMEFYQXNzY2pRam1uVQpQcVRvMUVBTDJOVExCTUZtSzF0RGVBVFZlS2l4N3M3ZG14ZHc1WUQrYlowY3lUUFhwNGtNL3NnaHZ4STRLY3ZrCkUxTlZGVWhXeXI0KzY3Uk42SnNQRmRReEZNWlduRVMvQ0ZGZ24xcFdqeVVhU0VXZ0l6WDl2RG1tSUV3S095YVUKVWM2Z0RMeSsxTlcyRlA3bk9xUFdidFlYL0Q2dlFqb3ptOWJOTHFQY3ZEMk1yQm14RGt0WEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUlgwcXRtCmdtV0NBS1luMTdJb0NZTndCbWxmdkRBZkJnTlZIU01FR0RBV2dCUlgwcXRtZ21XQ0FLWW4xN0lvQ1lOd0JtbGYKdkRBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQU5VNDl6eDZCb1J2UjUvUzZvTVp3T2hieUVlNXVZak9mRHBTdAo5SU9MUWR2eVJVREdWbjBkZkZIcHE3OHZNOWRkNnY1V1pFOEg1NXcrMFdCa2hLQWQvM3pnZ3BjbVNFZ0kyV1p0Cjl6cnBXbndQTUZpdXc5Yk53Wi9PNWZNVlpEVHZ5dWJuZnhteml3MEFrcXQ3WGMzM0dnRkZ3YnI2NzYrU0sra3oKcHBhQkRCRSs1YzRKTHRpT1FSVUt5UDZRTzh2NjhGQm1WclF3aitZUmdiWXRRLzZkU2VEN2hxVUk5OHZidzNCYgp6Z0F3cXZDSVdJaXA5WGR2OW1rKzNPR0lIakkvekorU1BFYnZUTFRtNEhTVnVicHF0ZEFwMmJ4UVBOOVo4ZjJQCmVueUVBQXdPeVBDZVczUm5tNHNtWnVlbFdoRnA5WWYvQ0JWYk9UenVLNFI5UmJTS0NnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T14:18:00Z" service.beta.openshift.io/expiry: "2028-04-21T14:18:00Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: a32ef7e0-7914-4faa-83df-ac4189dc46bb creationTimestamp: "2026-04-22T14:18:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"a32ef7e0-7914-4faa-83df-ac4189dc46bb"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T14:18:01Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: a32ef7e0-7914-4faa-83df-ac4189dc46bb resourceVersion: "8012" uid: 67be1fa2-64a4-48f9-af87-83b966ecd3ba type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T14:17:54Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 40ef97d0-40fc-4b36-8fd8-7ab384ab5798 service.beta.openshift.io/expiry: "2028-04-21T14:17:54Z" creationTimestamp: "2026-04-22T14:17:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"40ef97d0-40fc-4b36-8fd8-7ab384ab5798"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T14:17:55Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 40ef97d0-40fc-4b36-8fd8-7ab384ab5798 resourceVersion: "7869" uid: 0f992db4-9083-461f-88cf-1452f04f10bb type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T14:11:57Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2d7701df-ea58-4198-acda-ea4fcddfd352"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T14:11:57Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T14:12:10Z" name: operator-dockercfg-pztgc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 2d7701df-ea58-4198-acda-ea4fcddfd352 resourceVersion: "3847" uid: 3adc700b-31d6-4e2d-a901-d89ab8d3c5d4 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21084"