--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T19:15:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3d7f54c6-21ec-4040-8531-62d7c160eb75"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:09Z" name: builder-dockercfg-vc6l8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 3d7f54c6-21ec-4040-8531-62d7c160eb75 resourceVersion: "41798" uid: 642332ce-28c9-4148-ab86-ceac0cb35a3a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T19:15:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"002fe2db-409c-48d7-af5f-ac07d200d565"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:04Z" name: default-dockercfg-425wf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 002fe2db-409c-48d7-af5f-ac07d200d565 resourceVersion: "41556" uid: 1f51b777-20d0-4006-b24c-17ea2537da1d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T19:15:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b24fb4a5-a384-46a6-9153-7700c9341e33"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:09Z" name: deployer-dockercfg-l5m2n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b24fb4a5-a384-46a6-9153-7700c9341e33 resourceVersion: "41777" uid: fa3a0eb6-02f7-436e-b8ec-4e13a049a9af type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T19:15:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"99bc7c8c-17c5-4ce5-8b1c-9229374eff16"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:05Z" name: gather-dockercfg-8bvpt namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 99bc7c8c-17c5-4ce5-8b1c-9229374eff16 resourceVersion: "41594" uid: e38cf349-0614-4e28-850d-34b7bca499e7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T19:15:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a1b0030a-b1f6-45e0-9013-41259320d6ac"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:05Z" name: insights-runtime-extractor-sa-dockercfg-vl99s namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: a1b0030a-b1f6-45e0-9013-41259320d6ac resourceVersion: "41595" uid: f536bb70-56c3-44fc-b266-6ef3739d152c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:19:03Z" service.beta.openshift.io/expiry: "2028-04-15T19:19:03Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: c4b613b8-e82c-413d-8211-07d6261ab15b creationTimestamp: "2026-04-16T19:19:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c4b613b8-e82c-413d-8211-07d6261ab15b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:19:04Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: c4b613b8-e82c-413d-8211-07d6261ab15b resourceVersion: "7453" uid: 4ed9256b-372f-4a6e-8498-644d64ff4fbd type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T19:18:57Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: a9f2dd00-831a-476e-9a4c-aad98577e721 service.beta.openshift.io/expiry: "2028-04-15T19:18:57Z" creationTimestamp: "2026-04-16T19:18:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"a9f2dd00-831a-476e-9a4c-aad98577e721"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T19:18:58Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: a9f2dd00-831a-476e-9a4c-aad98577e721 resourceVersion: "7291" uid: 85aaaef4-7bbc-490c-a800-86612b060edd type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T19:15:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e469254b-5d9c-4865-84a7-22e6621ef75f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T19:15:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T19:51:05Z" name: operator-dockercfg-pwb9n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: e469254b-5d9c-4865-84a7-22e6621ef75f resourceVersion: "41606" uid: 46abba58-015c-48fc-9a16-99124bd68d14 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46881"