--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:28:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"95b8655a-28a8-4f0d-bb3a-5f86dcbbadf3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:04:14Z" name: builder-dockercfg-q82xw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 95b8655a-28a8-4f0d-bb3a-5f86dcbbadf3 resourceVersion: "25354" uid: 7d4a49df-ca0b-4a81-9f66-7e98bbf0ca96 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:28:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"848c15be-f2d0-4cd4-a1de-27fa98b304e0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:04:09Z" name: default-dockercfg-tn9sj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 848c15be-f2d0-4cd4-a1de-27fa98b304e0 resourceVersion: "25195" uid: 8821493f-57f0-490c-9905-9569281b5100 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:28:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cd81e632-b63b-46cb-85f1-252564c6a872"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:04:14Z" name: deployer-dockercfg-rfx9z namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: cd81e632-b63b-46cb-85f1-252564c6a872 resourceVersion: "25364" uid: 843323d1-3c19-4228-afad-201fcca5d67b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T16:28:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8c802dc-7591-4971-bb58-7513b02f74d2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:04:09Z" name: gather-dockercfg-rlwpk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: d8c802dc-7591-4971-bb58-7513b02f74d2 resourceVersion: "25208" uid: 699c5c19-3671-4a3f-8c37-0710105ad7ed type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T16:28:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80569ebb-57f5-4465-9335-ae0c1336915a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:04:09Z" name: insights-runtime-extractor-sa-dockercfg-m9k6s namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 80569ebb-57f5-4465-9335-ae0c1336915a resourceVersion: "25205" uid: 7125a719-7e35-4a0e-ad0b-352141bf32d2 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:33:59Z" service.beta.openshift.io/expiry: "2028-04-16T16:33:59Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 1d034275-8755-43e7-85af-f2d366ea6ff3 creationTimestamp: "2026-04-17T16:34:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"1d034275-8755-43e7-85af-f2d366ea6ff3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:34:00Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 1d034275-8755-43e7-85af-f2d366ea6ff3 resourceVersion: "8129" uid: abe885ec-6499-437e-ad1c-5261cc052a51 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:33:53Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 385510d6-1b2f-4946-a87e-20a0ec5a89ff service.beta.openshift.io/expiry: "2028-04-16T16:33:53Z" creationTimestamp: "2026-04-17T16:33:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"385510d6-1b2f-4946-a87e-20a0ec5a89ff"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:33:54Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 385510d6-1b2f-4946-a87e-20a0ec5a89ff resourceVersion: "7994" uid: 054fcd9d-1f95-49ac-9de2-29713682275e type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T16:28:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6d168604-a8ab-410e-b9c1-bad64106b1d3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:28:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:04:09Z" name: operator-dockercfg-4zbmj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 6d168604-a8ab-410e-b9c1-bad64106b1d3 resourceVersion: "25192" uid: 20e54539-a82e-4daa-9e61-fa453a56c00a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "43146"