--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T20:08:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0ae1069e-ee67-4231-83f3-a743a6a31025"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:52Z" name: builder-dockercfg-pb6mf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 0ae1069e-ee67-4231-83f3-a743a6a31025 resourceVersion: "25926" uid: 96888b3f-869d-4e1f-9a35-9824175c98ce type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T20:08:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"33f64426-3279-4628-ac00-b67b959d89a3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:48Z" name: default-dockercfg-lb2qp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 33f64426-3279-4628-ac00-b67b959d89a3 resourceVersion: "25803" uid: e17e72ba-f8ce-4c8d-9d30-3c7a9a8da2f1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T20:08:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"66518b11-efa0-4348-a72c-c158198cc617"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:52Z" name: deployer-dockercfg-zb8lg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 66518b11-efa0-4348-a72c-c158198cc617 resourceVersion: "25934" uid: af17ba09-d674-4660-812f-f55678cccf43 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T20:08:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e71dc475-f6be-4b80-90f4-e521852e25e1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:48Z" name: gather-dockercfg-cw6hf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: e71dc475-f6be-4b80-90f4-e521852e25e1 resourceVersion: "25806" uid: f6cfd651-4a7b-4729-9e11-5e83147631b9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T20:08:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e79f444b-09e5-4810-ba5c-1b5707957454"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:48Z" name: insights-runtime-extractor-sa-dockercfg-zvwln namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: e79f444b-09e5-4810-ba5c-1b5707957454 resourceVersion: "25802" uid: ab744f80-a1e1-4dbb-82ee-b33cf0b604b4 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T20:14:31Z" service.beta.openshift.io/expiry: "2028-04-15T20:14:31Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: bafbf66e-ade8-4ec2-93fe-102ab0b6247c creationTimestamp: "2026-04-16T20:14:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"bafbf66e-ade8-4ec2-93fe-102ab0b6247c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T20:14:32Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: bafbf66e-ade8-4ec2-93fe-102ab0b6247c resourceVersion: "7790" uid: 886e897b-bb46-43c4-b0da-ff0e437bc8ef type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJZUxDZURFQjdaeDR3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTNNRFExTnpBZQpGdzB5TmpBME1UWXlNREUwTWpWYUZ3MHlPREEwTVRVeU1ERTBNalphTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQUxGRzAybUs3YmZ3WlBXcGMzbXVrUElCdFVXRDVsdks4Z2M1MFR1WktpS3ExcGNtUlVDQwpWYm9nL1dCQVY5YXJDWUF2THhkekhGM29HcGtTV1B4SDQ0a0d1ZERETTlJUW9RUmFCQkZ0MldnczNaTUpiWDlpCmRrQUVXT2QxNVpXakU3Y0I4TGtCb2hKcmhudTNVME9iS1VETTh2R3A1cWRROVFrcGdrVnh1bkZCaVQ2UG5Nc1cKQ1FLNjRVOHBxNUoxeHNzWTlEa1EvaFp5QSt1WXBOMUI2VjNXSlRpUnUvcjBsdVBtano4QWlpYkFrWWVNeW1zZApIa3dNNm1ZY3NDTmI0SHZYSkhQd3Frb2hzbXhYdjYzaDNSeGhSYVdwdHZBNVlQUUwyMVVuSWg5ZExrUG5yVGVPCklLOVovMys0NThXYlVDSk45bFFxN0VHZmlrS2xEMk9ka1hFQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJSV0ZyQUlRSWV3eGF6cC9BM05ZTFpOZDNUVEJEQWZCZ05WSFNNRUdEQVdnQlQwSW1UQXdxU2JKQytnCkZIeERQKzFzOUEzMTlqQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkdJd01tWTJNakpoTFRZeVl6WXRORFExTmkxaU5ESXdMVE0zCk1HRXdNek14WTJSbU16QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFySEFCZEYzL2xHOFFFbVFBRjdha0tRRG0KUUR3TXFhNlo0Wmw4ZzVzNDlKLzZuUUk2S3hiUEZFR2N0UDlJamtGQkoxWjJpcnl6WkM0SXdUY05NWlRPUU9LQwpjVWRZcU1PSUI4Q0NRakpwd1doNlp1QVltTlF1Z0VKOXdPNjZEUXAwOEpqR0xCTlgxOVM2ZklBSUw5V3BQZThvCnl0MTBOSUIvMjJ5em81eWtzUFlweDJ5NFdRQ3BRVmNlZi9jc0VldmJFT3lxd3lzay9ySW0xa1pudW4xckx1amgKQUJvNVFQa2RBVThNUUVadndZVWE1MDJXL0pkeE9kMFpaemRsZWFqbENRb2YvOUZkYWNTM040Qkl3SEYxWlUrcgowVUlxMXZENG9ZNFB1TDQ4bm1tWVE3VlMyZWttaFVMNUYwUFptaThwYktvUW1oTkRlSDhpNytUaHRLUVF0QT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJVXJwT2ZLSlRFcFF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTTNNRFExTnpBZQpGdzB5TmpBME1UWXlNREUwTVRaYUZ3MHlPREEyTVRReU1ERTBNVGRhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOell6TnpBME5UY3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzJwK2R0Yk9xOFRYRitidi9aUXQrbDFtQUlUcHNndjV5NApraVRxYk51UklKeGJzWFk2ZkVVV3pSV1lXK2hGRjhxRDlkYzhDUDdRTE4rYVh1VGNGMWVVVFY2V05ObVNZR0dFCjdiWHlkSlc1SzdoTklzV1NVUFRiTWl2L2lxcXYzWDlpQnBUbVNVVjR1TzRZM0N0QzdvWWpzTEc1S0l6TTkxSlAKTUdrOUhYbjF3eE85K09RaXVGM1daU2xJajZ5aEh0TzZWenVXRnVvMFJLV1JkejIvUmdDVnlUWFd6OUxSZzgrSworRGJoQ3FtYjlWdzF1WStpc2JkRnI2OWZZNEFnREkyWHZFYTlPd2NCSW54NkxFZWFOMjZ6TFVYRzlGN2J1Vk9vCjdXbGhNZzByVzc0YjVYT3EweFVBelJEUHhoRkRueFJ6Vm4xbkNOVW5GVnE4Y0QyWk44dlpBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlQwSW1UQQp3cVNiSkMrZ0ZIeERQKzFzOUEzMTlqQWZCZ05WSFNNRUdEQVdnQlQwSW1UQXdxU2JKQytnRkh4RFArMXM5QTMxCjlqQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFSZEIwK05XQnVUY2VWVE1mME1iWGFhdXh6cThvSmpnUWNtNE0KaS9SQndzaGhodGpueGJJQWJ3c2FhZUo2L2g5c2RMS1M4VlVqRXdJS3p6S2twb1dId0RscFBqU1E2UDhVSENJLwpzNmNjS2FseU5EVlNjR0hjMlI3QnFyaktrckNUTzdnWDlDYllrQXM1WWg2aGlVTmpnWFRQRVFGQ05KaGVXUVlhCjhaUnVaR3k2ZVI4cE54SGpBL1R2QzZqVTNZcXltT1ZjYnM4M2IwVzBuNzhrQllYYUZLbmo5UlRYTUJPWkxRWFIKeVI2czJ5bkRHNTRSa09oTTZwQThEb2o5REZxVUNHOXJzdjYvZFgzdG1XY0ZtSHdzSlVUTktSbUFTZ2F4M0FNbgp3SVdDTzBaY3E4VWJ5WlQrYnNESEIvbXFGRFd2eXl3bW1vRHoyU203RUY0NmFtZXhudz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T20:14:26Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: b02f622a-62c6-4456-b420-370a0331cdf3 service.beta.openshift.io/expiry: "2028-04-15T20:14:26Z" creationTimestamp: "2026-04-16T20:14:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"b02f622a-62c6-4456-b420-370a0331cdf3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T20:14:26Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: b02f622a-62c6-4456-b420-370a0331cdf3 resourceVersion: "7672" uid: 58434325-a22a-464e-9a27-3d2e10f43e2f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T20:08:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"280b8ae1-9cf6-4498-bd48-5b36fa9e2101"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T20:08:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T20:44:48Z" name: operator-dockercfg-h56nh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 280b8ae1-9cf6-4498-bd48-5b36fa9e2101 resourceVersion: "25809" uid: 9e2766ac-1cc8-4e12-ba6f-5388501ad9e6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "40040"