--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:27:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e52ae961-7413-40ec-a784-a09804b5039e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:20Z" name: builder-dockercfg-6tdx8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e52ae961-7413-40ec-a784-a09804b5039e resourceVersion: "3814" uid: a80ddf5a-0e12-4721-8de0-41d959010c04 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:27:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7c69eae6-99b6-42e2-a1a9-6e4553979fbf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:15Z" name: default-dockercfg-6trmm namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7c69eae6-99b6-42e2-a1a9-6e4553979fbf resourceVersion: "3314" uid: f212ebc1-c4b4-43bc-b675-527492d1de9b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:27:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:20Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"497c8e04-a837-41c6-b61a-e817f71a2ae0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:20Z" name: deployer-dockercfg-qrblg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 497c8e04-a837-41c6-b61a-e817f71a2ae0 resourceVersion: "3813" uid: bc53043b-1ace-45e8-8d71-9901573ee65f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T16:27:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b25bc473-2f69-4ece-8d61-58618d3ebfef"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:16Z" name: gather-dockercfg-vkc7b namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: b25bc473-2f69-4ece-8d61-58618d3ebfef resourceVersion: "3330" uid: 1812ce54-96ab-40c8-8e80-d3cfd69f290a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T16:27:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5caa6225-0b1a-4278-9a1e-e020a64e35ce"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:16Z" name: insights-runtime-extractor-sa-dockercfg-shqjl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 5caa6225-0b1a-4278-9a1e-e020a64e35ce resourceVersion: "3335" uid: caa24756-5426-40e0-9c41-cc4d0ca22db1 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:33:20Z" service.beta.openshift.io/expiry: "2028-04-16T16:33:20Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: eebf75ec-7e34-455e-bba8-a84bf42080c7 creationTimestamp: "2026-04-17T16:33:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"eebf75ec-7e34-455e-bba8-a84bf42080c7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:33:20Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: eebf75ec-7e34-455e-bba8-a84bf42080c7 resourceVersion: "8042" uid: 255258c6-b8a8-4cb9-853e-16499b986c49 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:33:14Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 30e101e1-f34f-41cb-941c-d6d1f1bbfff5 service.beta.openshift.io/expiry: "2028-04-16T16:33:14Z" creationTimestamp: "2026-04-17T16:33:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"30e101e1-f34f-41cb-941c-d6d1f1bbfff5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:33:15Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 30e101e1-f34f-41cb-941c-d6d1f1bbfff5 resourceVersion: "7929" uid: d2b819d6-cdeb-4ba8-9f8e-8b0a5a5672a7 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T16:27:15Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f659db67-2e47-417a-9d81-98962462421d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:27:15Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:27:16Z" name: operator-dockercfg-vtfzj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: f659db67-2e47-417a-9d81-98962462421d resourceVersion: "3340" uid: 28bb438d-cfb6-4dbd-a3f7-60a6688ff1aa type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "36036"