--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T18:06:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"005abbc5-b28e-481a-b9e0-fb7c580ee461"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:36Z" name: builder-dockercfg-l77x9 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 005abbc5-b28e-481a-b9e0-fb7c580ee461 resourceVersion: "25574" uid: 83d07098-0148-4c31-9e08-8c5231214777 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T18:06:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"060d1949-20eb-456d-8cf5-0bf3b6ce4b93"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:31Z" name: default-dockercfg-znqb7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 060d1949-20eb-456d-8cf5-0bf3b6ce4b93 resourceVersion: "25421" uid: c2983993-3680-41a2-b0a4-2a5dc9c141e3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T18:06:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ecd79a74-3716-4440-b7db-87c8b101886e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:36Z" name: deployer-dockercfg-44gtk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ecd79a74-3716-4440-b7db-87c8b101886e resourceVersion: "25568" uid: b8d1b36e-255d-42bc-a518-47d94fc590ed type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T18:06:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a7beed23-c7f1-416b-9170-2f3c25a7c991"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:31Z" name: gather-dockercfg-8nlsx namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: a7beed23-c7f1-416b-9170-2f3c25a7c991 resourceVersion: "25426" uid: 34776691-56a1-4c85-93a9-9450371428e4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T18:06:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d647071a-0d23-4d00-aa5e-f736d00f8be9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:31Z" name: insights-runtime-extractor-sa-dockercfg-7j8vd namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: d647071a-0d23-4d00-aa5e-f736d00f8be9 resourceVersion: "25422" uid: 37fadbe6-94c3-444d-a832-23d7ee56ba33 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:11:59Z" service.beta.openshift.io/expiry: "2028-04-15T18:11:59Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 11755edf-cce0-41f1-80c3-779c188c7601 creationTimestamp: "2026-04-16T18:12:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"11755edf-cce0-41f1-80c3-779c188c7601"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:12:00Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 11755edf-cce0-41f1-80c3-779c188c7601 resourceVersion: "7810" uid: 042a48ce-63f2-4b53-b8ac-48f9da1616eb type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T18:11:54Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 9d24b23f-e01c-47d1-820e-071689d6c6dc service.beta.openshift.io/expiry: "2028-04-15T18:11:54Z" creationTimestamp: "2026-04-16T18:11:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"9d24b23f-e01c-47d1-820e-071689d6c6dc"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T18:11:54Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 9d24b23f-e01c-47d1-820e-071689d6c6dc resourceVersion: "7643" uid: 2ab193f0-fb06-4714-8204-2c6bd107a7a4 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T18:06:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"687d2129-4ae7-49fb-a5a4-ab1e7c779d73"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T18:06:31Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T18:42:31Z" name: operator-dockercfg-qgvv8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 687d2129-4ae7-49fb-a5a4-ab1e7c779d73 resourceVersion: "25434" uid: fe9e5c17-3df5-497b-b55d-b6a8d22c8cf3 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41594"