--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T17:59:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f5a97805-e60e-45d0-a3a5-b82382b5f2ba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:59:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:36:16Z" name: builder-dockercfg-j8p2k namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f5a97805-e60e-45d0-a3a5-b82382b5f2ba resourceVersion: "25744" uid: bc5bca7e-f897-4129-8fd3-6aa348dc3024 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T17:59:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f571574e-b71c-42a5-bc60-f6084a9f36f4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:59:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:36:14Z" name: default-dockercfg-5w29f namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: f571574e-b71c-42a5-bc60-f6084a9f36f4 resourceVersion: "25494" uid: f6f599ea-b024-4e16-bc10-e1bb13e09840 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T17:59:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"af1a4340-057b-4a2b-9fb8-4424ce2c7260"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:59:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:36:16Z" name: deployer-dockercfg-kp989 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: af1a4340-057b-4a2b-9fb8-4424ce2c7260 resourceVersion: "25755" uid: 82ac9f96-f1bb-4498-a9d8-f7cb3ff1788e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T17:59:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"12e2621c-1635-4bd1-9f7f-52c88a855874"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:59:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:36:14Z" name: gather-dockercfg-vkpfc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 12e2621c-1635-4bd1-9f7f-52c88a855874 resourceVersion: "25565" uid: 7cf08078-6122-4bf1-8db2-a51296f968c2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T17:59:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a3608dee-b5dc-4bd1-a490-f46a6c837d05"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:59:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:36:14Z" name: insights-runtime-extractor-sa-dockercfg-nw878 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: a3608dee-b5dc-4bd1-a490-f46a6c837d05 resourceVersion: "25571" uid: 116ef43e-cb60-43bd-a017-3641241f1552 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:03:54Z" service.beta.openshift.io/expiry: "2028-04-15T18:03:54Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: a6dccc96-fee3-46af-8971-906a1713ffa4 creationTimestamp: "2026-04-16T18:03:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"a6dccc96-fee3-46af-8971-906a1713ffa4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:03:55Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: a6dccc96-fee3-46af-8971-906a1713ffa4 resourceVersion: "7255" uid: d7a98917-26fc-47fa-ba01-102566cfc05e type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:03:48Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 59838e21-42be-465c-ad01-322768eac217 service.beta.openshift.io/expiry: "2028-04-15T18:03:48Z" creationTimestamp: "2026-04-16T18:03:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"59838e21-42be-465c-ad01-322768eac217"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:03:49Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 59838e21-42be-465c-ad01-322768eac217 resourceVersion: "7053" uid: f86e0b1e-0cd7-449f-9ea2-ed69fbc04c2a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T17:59:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8124db4a-a941-4354-a9d9-94a1cbd92d6d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:59:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:36:14Z" name: operator-dockercfg-pv6n6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 8124db4a-a941-4354-a9d9-94a1cbd92d6d resourceVersion: "25527" uid: ec55aa44-c69c-41d2-9558-96ecd0a4cb6d type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41626"