--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T20:08:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ca471e3d-d557-4871-8535-47a70d5fdbd3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:11Z" name: builder-dockercfg-ksgzv namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ca471e3d-d557-4871-8535-47a70d5fdbd3 resourceVersion: "38746" uid: 15a181a3-fe97-4d6f-9946-8c2b288eaf92 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T20:08:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2fe82558-eb63-4c64-b14e-becc960ac56b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:10Z" name: default-dockercfg-ppgfm namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2fe82558-eb63-4c64-b14e-becc960ac56b resourceVersion: "38691" uid: a9918e2f-e4e6-496f-84a0-d4254ffb9112 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T20:08:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"92430457-4043-44a0-a178-1f1823c5d486"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:11Z" name: deployer-dockercfg-zq48n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 92430457-4043-44a0-a178-1f1823c5d486 resourceVersion: "38734" uid: 9d49e36f-f083-48e6-a6ba-68c9dc0f1f5c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T20:08:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d59c9b21-efff-4275-988f-6c630d47d5a2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:10Z" name: gather-dockercfg-z4mrt namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: d59c9b21-efff-4275-988f-6c630d47d5a2 resourceVersion: "38634" uid: cc712a02-1fa9-4504-b7bf-51d61c48e288 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T20:08:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"97909955-ab8e-4f4b-9384-a5df5d6d0439"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:10Z" name: insights-runtime-extractor-sa-dockercfg-gwklr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 97909955-ab8e-4f4b-9384-a5df5d6d0439 resourceVersion: "38706" uid: 34915db9-86f4-4f1f-9df9-dc636781c1a5 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T20:14:19Z" service.beta.openshift.io/expiry: "2028-04-15T20:14:19Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 1b50bd9d-ae5a-4898-bd0f-223c0c1b76d1 creationTimestamp: "2026-04-16T20:14:19Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"1b50bd9d-ae5a-4898-bd0f-223c0c1b76d1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T20:14:19Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 1b50bd9d-ae5a-4898-bd0f-223c0c1b76d1 resourceVersion: "8052" uid: f0eda1bd-0dbe-462b-93a1-4e8d81b6ea72 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T20:14:12Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 9b7ab10c-ae7e-4880-bb7c-d403d32ec21f service.beta.openshift.io/expiry: "2028-04-15T20:14:12Z" creationTimestamp: "2026-04-16T20:14:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"9b7ab10c-ae7e-4880-bb7c-d403d32ec21f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T20:14:13Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 9b7ab10c-ae7e-4880-bb7c-d403d32ec21f resourceVersion: "7934" uid: 6900e50e-f0dc-44b6-9eb5-b670eac151cf type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T20:08:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"03cd822a-5a83-4bab-8dc3-36575cb9dccd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:10Z" name: operator-dockercfg-5wbbz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 03cd822a-5a83-4bab-8dc3-36575cb9dccd resourceVersion: "38670" uid: 8d45285b-efa8-45ec-b735-0b65b3d3ecaf type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "39694"