--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T15:31:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ba3ff8a8-442a-400f-8555-d9a0a15e8146"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:56Z" name: builder-dockercfg-xgw5x namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ba3ff8a8-442a-400f-8555-d9a0a15e8146 resourceVersion: "4245" uid: 29c6c46e-1834-4d56-8c4c-76b7a8204a54 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T15:31:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80c89fdd-f451-46f2-82b1-e9762a8b7f57"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:51Z" name: default-dockercfg-nj2qq namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 80c89fdd-f451-46f2-82b1-e9762a8b7f57 resourceVersion: "3561" uid: 98589c4a-9e81-4974-a31d-eea96ee7c78f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T15:31:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fb73b9a8-d320-41a9-b24b-bb8aa21844ec"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:55Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:56Z" name: deployer-dockercfg-wdf24 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: fb73b9a8-d320-41a9-b24b-bb8aa21844ec resourceVersion: "4244" uid: 47f88079-3daa-4ef6-b7f8-74c33bf134bf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-21T15:31:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2942d07b-29dc-402d-bc4c-df90b2d61a91"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:51Z" name: gather-dockercfg-68m6h namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 2942d07b-29dc-402d-bc4c-df90b2d61a91 resourceVersion: "3551" uid: 84aec81d-cc25-4dce-8221-b5fe1367b9ee type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-21T15:31:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0395ed82-9eb4-42ff-a6d3-95e171c8dba7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:51Z" name: insights-runtime-extractor-sa-dockercfg-shndr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 0395ed82-9eb4-42ff-a6d3-95e171c8dba7 resourceVersion: "3560" uid: 7d9dec69-9a11-4a6e-a584-a460aacf33b1 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJYUUvWG5hOC83SEV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzROVGcwTkRBZQpGdzB5TmpBME1qRXhOVE0zTXpkYUZ3MHlPREEwTWpBeE5UTTNNemhhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFMaE44NENCYmNFNG9EYWx2TzRGZlkvdDNuN1VrY2hpdEkyOXV3cEZsZGZXblR6ZAoxV0ZieWIydktvR1lwMW5Ud0hRZGRvVUFjdUVKb0xiVUlrazJ4aFBaemRMSGc5NFlZN01ML016Wm1uZ01yUmtBCnNwVkdWeGJjUERnSDNqUzZGc294a3pHdkZtTlRWdjZXckF6cko1a3AycW0zM1VxNE9OM2Q3ZlFNeEdQTm9COFgKTm0wQ2pTYzVvZE16R3V2REpUTktSYzhTeEM0M0JyNmhmbmtkY3dJTmN5V1YxdVUvSy9WUmN2SjZUN0FZQXlDUwpVK1R4YUxCY25Jb3RZWXVQQXo1bmR1M0lITkZRcUYybVllKzJJbDFmMVp2YUt6OWsrdXhvdWR0T0tvdVRQQVFvCndYZUVwUUttU3RHOE9jVVRBTlZNOUtuQWw4cmxVRlhBeUo5aEEwRUNBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCUWlpc0VQWURGcWMvMVJnYnpHUlJkTkpDVzE1ekFmQmdOVkhTTUVHREFXZ0JSZ2Jvb0JrNG9uCkxvV1lzZHg5d0RnOXc0aFU0RENCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rTlRZNVpHUTVZelV0TXpOaU1pMDBZV000TFRneU9XWXRNemM1TVRFdwpZbVEzWlRWbE1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQjV4STRrZ0FCRUxJZ2RnY1ZMQUp1akVvR1h1L1RXClRzQllXYUVWektWVGlBVUZ3cTFEVTdLMUpreFZWZ2hBbHNvYVNzMkZ2N3BDTktweWR5Um5oMVQvbkp4NFl6ZWwKelNVZUhaN0tqeXhjamNNSVpMNGlLR1R6aXhCckkrWTNaMTFQWmFkRVkxeHh0TUR3d3RRTlBqcUsrUGp4bDBXeQphTFVFcjJVM0l5SlgzQjZHUXBzK3c0QlJ4N25Xa2JROWxHcDBmNmVwbmFDQTRrUGJGWXYxYjZnU0ZwRnhkTVk1CnlBUENIR2o5bEZlY3BOK2lGaWpmcGtWTUhPL0R3WjRwczFXalR1QkhtMng2YzNhaFZTSU9CNEFyT1ZDT1l0VlkKeUd5dmE0TDAwdUVLaitpRTRneHo4S3VEN29nR0hoKzFxb0xHVW1zNWh0QTFpR2ttQTcrSFJxUTcKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlNaWtKdVJteklxQXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjNE5UZzBOREFlCkZ3MHlOakEwTWpFeE5UTTNNalJhRncweU9EQTJNVGt4TlRNM01qVmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNPRFU0TkRRd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEQ1FvOUdzZzYzcUcvWlJnUHpMd2l3MTVvZXErbC9OWWF4CjJ5VHhta3FhRlFKU0xxUGdjemNvT0EvQkc3MTU4ZE1pUm1NZHovbTZid0pRUWM4OVpNRlVMUjU1RXM1MWt1SFAKT3poUm9wNWVDUk9pUmt5Zzc5THFtaGh1NWVSdVQrQ2JhcjhVdjVicFFucHhSUEw0aXhmN2JPbTNnUlZQYi82SAptbHJqSVZjOHBRSjloTVBHNXNvd0pXeXU0YURxZGpjRnZOSS9OSE9JeUVQWkFuWjBrR0VEQVNja1JJWXdZS2w5CjBwY3VhdjNjcFgrVk9PSnIxTmt0K2d3ZERSVUZiUDU2NHF2ZWVEOWVKY09QZCtEV2FhV0ZpbGExd0xFeFhLTS8KZ0greFBrVEc1NHU1T2kvNHF4WUFSWlk3TnUySjRwdXZ3Mk1UOGJNUGN2azlKUmZ6aW1WaEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUmdib29CCms0b25Mb1dZc2R4OXdEZzl3NGhVNERBZkJnTlZIU01FR0RBV2dCUmdib29CazRvbkxvV1lzZHg5d0RnOXc0aFUKNERBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUtDOWdsRUFWWTg0L3pqT0I4c2xTNS9oeFFYUlovVmlrelRWRgpoSExkZHF1T2d3MzhWTjcwNklhbUlnY1VaZXpVMXVNdGhONzF6SW13dDBzTVNmOGtHT1ZwOThEZVpvdVltckZiCndlSWQvdXltdTF6NjJIUGRLN1htQll2WFVDYWhOZzllV2Z4MzIyM1FRRmdxV1BHWWVMTitnaTNaYzB4RHEwRUQKVWczTUhIVGNEOHlvRUE2eWNGdVRHbzI5RHhrN3NwS0F6NGhxeEthMGZENHB0R1pML3oveitKVUtPNGYzUnNPOQp1SUZHcjNHTjNRNm1MN29jZTRLb0t5UldEZGVhWWpqS05oSHVuRzBXWEgyL1ZmSTJxcCtlYVFxS2NYaitVVm5hCk1kNVhPaGc1Wm5yYkdWMzNtZmZJM0x1ckxmbjgyUkVXb2p5Mnlyb3VmeERxWE1aRjdBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T15:37:38Z" service.beta.openshift.io/expiry: "2028-04-20T15:37:38Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 569dd9c5-33b2-4ac8-829f-379110bd7e5e creationTimestamp: "2026-04-21T15:37:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"569dd9c5-33b2-4ac8-829f-379110bd7e5e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T15:37:39Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 569dd9c5-33b2-4ac8-829f-379110bd7e5e resourceVersion: "7914" uid: 15690620-cc47-4990-bb5c-b846ee92d78e type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJV3poWXF3dnFTTGt3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzROVGcwTkRBZQpGdzB5TmpBME1qRXhOVE0zTXpKYUZ3MHlPREEwTWpBeE5UTTNNek5hTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQU1hS3JKL0ZNbC9Qay9JYTJ6Uys5cVlTTjlaWDJwSzJnVi9sd0VJdHowbnJQSWJpMHQ0VgpiS0V6eHE5YVY0R0V4QktKSk8ybm8yTVZZL0psZnZwZk9FUDlsamljWHltSStNL1c1ek1LUHVKN3p3MHAyMm5sCjJTZnRZY3lNV3UvcGxocXZtTHhQMnJ4NnQweUx1ZkNNVmpzdnA3UnplRVU1VTI3SlJ6TFZlSU9TcmJwWkorNXAKMWdkbGxNMnVYSjdOUkZLRERaK3o3bFFRcjBNT3lhby9NMTZxZXdHV0J0OXNDNllQUlFMSHcxcXZNd01PdHRUcAo2UG1ETXRiTFhHanZJR2VWdit0S01Eamx6eG5sUnNSbHowOHZTSXZJeWtjWFhhakJZMjFBRXkyRENPWEFqSWo3CmNWNWJlSkNkcVZMU3ZlNlUra01OQmRJYk80Sm4xVFpNWmdFQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJRdUNPNndnb010bGlmS2tabG8xVStRczlaU0l6QWZCZ05WSFNNRUdEQVdnQlJnYm9vQms0b25Mb1dZCnNkeDl3RGc5dzRoVTREQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkdSaE1tTXhZVGhpTFRFMllUTXRORFk0TlMxaU5EY3pMVFF6Ck1UWTFPVEZrWXpKaU5UQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFqRUJ2alczOUxQM0JRRTR2emlQNzFCM3cKRUFQUHBXbGNFclhOV3hpVG9YZkRTanhNZGIwd0kvVzEwa1RGRDNaVFhoL2xLREwySkwzMTdNZXRyaXMzRlc2aApCaFJ0NFFlVUlBUVJrNFVjd2VOT2o0VDdzMG5qZWs3YTRhRHJlMFEzcHRTQkxPeVJsVnJhRzFOQ08yZk1vWnV5CkJIQ1hTTVZnY3JyUWk5OW9UM3ZUWUpxYWhXUFhRQkgzRVB0WUdVL3JOTnVoRzdGZExZNzZkVmdUbVIrRVRJcG4KRGxCY1F1YUMvcVNRTnQvT1N2VTBrRkRxQmdvaVNveFI2WWFSWWFaRW5DZVY2YStNNHhpNVcrKzRrYVR1dEtLcgovZG93UTZCOUtCVmZZK3hPR0E3clFUaEtSQ2h0STluaGdETi80R1RpOFVjOVFCeTBKZmxvL1VvdHU0aHcxZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJTWlrSnVSbXpJcUF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzROVGcwTkRBZQpGdzB5TmpBME1qRXhOVE0zTWpSYUZ3MHlPREEyTVRreE5UTTNNalZhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelkzT0RVNE5EUXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRENRbzlHc2c2M3FHL1pSZ1B6THdpdzE1b2VxK2wvTllheAoyeVR4bWtxYUZRSlNMcVBnY3pjb09BL0JHNzE1OGRNaVJtTWR6L202YndKUVFjODlaTUZVTFI1NUVzNTFrdUhQCk96aFJvcDVlQ1JPaVJreWc3OUxxbWhodTVlUnVUK0NiYXI4VXY1YnBRbnB4UlBMNGl4ZjdiT20zZ1JWUGIvNkgKbWxyaklWYzhwUUo5aE1QRzVzb3dKV3l1NGFEcWRqY0Z2TkkvTkhPSXlFUFpBblowa0dFREFTY2tSSVl3WUtsOQowcGN1YXYzY3BYK1ZPT0pyMU5rdCtnd2REUlVGYlA1NjRxdmVlRDllSmNPUGQrRFdhYVdGaWxhMXdMRXhYS00vCmdIK3hQa1RHNTR1NU9pLzRxeFlBUlpZN051Mko0cHV2dzJNVDhiTVBjdms5SlJmemltVmhBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlJnYm9vQgprNG9uTG9XWXNkeDl3RGc5dzRoVTREQWZCZ05WSFNNRUdEQVdnQlJnYm9vQms0b25Mb1dZc2R4OXdEZzl3NGhVCjREQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFLQzlnbEVBVlk4NC96ak9COHNsUzUvaHhRWFJaL1Zpa3pUVkYKaEhMZGRxdU9ndzM4Vk43MDZJYW1JZ2NVWmV6VTF1TXRoTjcxekltd3Qwc01TZjhrR09WcDk4RGVab3VZbXJGYgp3ZUlkL3V5bXUxejYySFBkSzdYbUJZdlhVQ2FoTmc5ZVdmeDMyMjNRUUZncVdQR1llTE4rZ2kzWmMweERxMEVEClVnM01ISFRjRDh5b0VBNnljRnVUR28yOUR4azdzcEtBejRocXhLYTBmRDRwdEdaTC96L3orSlVLTzRmM1JzTzkKdUlGR3IzR04zUTZtTDdvY2U0S29LeVJXRGRlYVlqaktOaEh1bkcwV1hIMi9WZkkycXArZWFRcUtjWGorVVZuYQpNZDVYT2hnNVpucmJHVjMzbWZmSTNMdXJMZm44MlJFV29qeTJ5cm91ZnhEcVhNWkY3QT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T15:37:33Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: da2c1a8b-16a3-4685-b473-4316591dc2b5 service.beta.openshift.io/expiry: "2028-04-20T15:37:33Z" creationTimestamp: "2026-04-21T15:37:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"da2c1a8b-16a3-4685-b473-4316591dc2b5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T15:37:34Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: da2c1a8b-16a3-4685-b473-4316591dc2b5 resourceVersion: "7802" uid: 1b04e3ad-d3bb-4be0-b177-8ba1adfe21fb type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-21T15:31:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"86c68fc4-741e-4192-9b30-b70100713fd2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T15:31:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:31:51Z" name: operator-dockercfg-hnn5q namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 86c68fc4-741e-4192-9b30-b70100713fd2 resourceVersion: "3592" uid: d203b74e-ca04-44e3-a67e-4fb8835b3b6b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "37127"