--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T17:58:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"65987d31-7628-4579-8713-924ae849b031"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:37Z" name: builder-dockercfg-72fth namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 65987d31-7628-4579-8713-924ae849b031 resourceVersion: "3998" uid: b4de4f53-ba42-4fe8-972b-56e56fd6011e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T17:58:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"71e4e1af-f887-4263-ae69-20eb5759d8c8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:36Z" name: default-dockercfg-xbs2m namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 71e4e1af-f887-4263-ae69-20eb5759d8c8 resourceVersion: "3846" uid: 02b4000c-238f-46d6-9437-fa09a59372b5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T17:58:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2ed98816-8796-4be5-a54c-e619c0e22bc4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:37Z" name: deployer-dockercfg-j96f4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2ed98816-8796-4be5-a54c-e619c0e22bc4 resourceVersion: "3995" uid: c6d97cf2-5d97-479a-8b0a-5f36262f3478 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T17:58:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e8ec825e-05c2-4660-bf9b-7a1a5c77bc19"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:36Z" name: gather-dockercfg-7j4w2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: e8ec825e-05c2-4660-bf9b-7a1a5c77bc19 resourceVersion: "3850" uid: e573b972-cb05-4415-aef8-908a7c1b134c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T17:58:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"478b3f8f-820f-47a9-9f1d-b7d81afea8fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:36Z" name: insights-runtime-extractor-sa-dockercfg-vblvg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 478b3f8f-820f-47a9-9f1d-b7d81afea8fd resourceVersion: "3848" uid: b7bfcece-35fc-492f-a74a-8ae8c57230da type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:04:41Z" service.beta.openshift.io/expiry: "2028-04-15T18:04:41Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: a16a24cc-00e7-4840-a7ce-1c69726a82a8 creationTimestamp: "2026-04-16T18:04:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"a16a24cc-00e7-4840-a7ce-1c69726a82a8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:04:42Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: a16a24cc-00e7-4840-a7ce-1c69726a82a8 resourceVersion: "8119" uid: 1719a7aa-2969-458f-a509-61f099f4feeb type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:04:35Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 02574b72-d392-4838-acba-cf52f6f83f5f service.beta.openshift.io/expiry: "2028-04-15T18:04:35Z" creationTimestamp: "2026-04-16T18:04:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"02574b72-d392-4838-acba-cf52f6f83f5f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:04:36Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 02574b72-d392-4838-acba-cf52f6f83f5f resourceVersion: "7934" uid: 22f48700-856a-44e4-a5ce-ee48aab48f9e type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T17:58:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"98e42d32-5591-4a4b-bc4a-efcca3bbf805"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T17:58:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T17:58:36Z" name: operator-dockercfg-xjwf9 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 98e42d32-5591-4a4b-bc4a-efcca3bbf805 resourceVersion: "3849" uid: 3aca15f0-6d68-49de-86d8-fa24a95f7eb8 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "20803"