--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-19T12:27:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"21eb148f-68f0-4787-8ac0-b600bf5bd7b5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:27:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T13:03:40Z" name: builder-dockercfg-vp4h2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 21eb148f-68f0-4787-8ac0-b600bf5bd7b5 resourceVersion: "43704" uid: c09a1ac5-c1bf-4ab5-94ff-ef460ef56bc5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-19T12:27:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"57a0b0d4-f24e-4f86-9fa3-f98b48900af0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:27:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T13:03:35Z" name: default-dockercfg-4d24l namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 57a0b0d4-f24e-4f86-9fa3-f98b48900af0 resourceVersion: "43487" uid: b3d0c572-d996-4050-b18e-fb030a9fce08 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-19T12:27:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4934ddf8-6c91-4304-9284-0ac530f721f2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:27:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T13:03:40Z" name: deployer-dockercfg-9lqd4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4934ddf8-6c91-4304-9284-0ac530f721f2 resourceVersion: "43697" uid: 31497d74-71bd-451d-adb5-4a405d0a646e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-19T12:27:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f61b73ca-561b-461d-af32-e3b1821b68db"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:27:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T13:03:35Z" name: gather-dockercfg-54v2d namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: f61b73ca-561b-461d-af32-e3b1821b68db resourceVersion: "43491" uid: a179066c-cb9f-4e61-af4c-acb03336f72b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-19T12:27:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"54bec423-dc64-42b3-aa45-e47a31dc6879"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:27:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T13:03:35Z" name: insights-runtime-extractor-sa-dockercfg-8lgzb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 54bec423-dc64-42b3-aa45-e47a31dc6879 resourceVersion: "43495" uid: 5c27e3ca-f891-4263-ae3f-0fd70af8361c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-18T12:33:12Z" service.beta.openshift.io/expiry: "2028-04-18T12:33:12Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 61ca91a4-60ea-406b-8189-adeeb4850062 creationTimestamp: "2026-04-19T12:33:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"61ca91a4-60ea-406b-8189-adeeb4850062"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-19T12:33:13Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 61ca91a4-60ea-406b-8189-adeeb4850062 resourceVersion: "7841" uid: b614342d-f2f2-4849-ab3f-740a504f66d7 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-18T12:33:07Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 03c04eea-6221-43cc-a6e9-d20b4b6d21e5 service.beta.openshift.io/expiry: "2028-04-18T12:33:07Z" creationTimestamp: "2026-04-19T12:33:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"03c04eea-6221-43cc-a6e9-d20b4b6d21e5"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-19T12:33:07Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 03c04eea-6221-43cc-a6e9-d20b4b6d21e5 resourceVersion: "7714" uid: 59f2356b-1f40-4cbd-b2da-5ecff935577c type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-19T12:27:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5af28e54-c2dc-4663-b0e3-54f0a8387c0c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:27:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T13:03:35Z" name: operator-dockercfg-6wskm namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 5af28e54-c2dc-4663-b0e3-54f0a8387c0c resourceVersion: "43485" uid: df50e155-6bf5-4850-99bf-13f318b41a5d type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47098"