--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-19T15:20:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"df409237-ea2c-49b6-b73d-46ebe9add3e3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:35Z" name: builder-dockercfg-hp5wh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: df409237-ea2c-49b6-b73d-46ebe9add3e3 resourceVersion: "44537" uid: 2778f839-a867-48a8-8c48-dce3d36a7d52 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-19T15:20:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c47b1672-8010-44b8-9a82-590595d7c85e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:30Z" name: default-dockercfg-8f7mp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c47b1672-8010-44b8-9a82-590595d7c85e resourceVersion: "44311" uid: cbee8bda-24ff-48a4-b072-412505d822d8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-19T15:20:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a57d5356-dd8d-41ef-bc3b-091113ceef4a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:35Z" name: deployer-dockercfg-hn97j namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a57d5356-dd8d-41ef-bc3b-091113ceef4a resourceVersion: "44558" uid: 305f4ea1-70fd-4baa-bddc-7a20a7d36c0c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-19T15:20:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5cc821a5-019f-42e3-9e5d-9ca9f872f001"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:30Z" name: gather-dockercfg-plvk8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 5cc821a5-019f-42e3-9e5d-9ca9f872f001 resourceVersion: "44329" uid: f1602b10-e383-448b-a7be-258344c8f95c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-19T15:20:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"45925be2-ddb8-49cc-ab76-b1976b497083"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:30Z" name: insights-runtime-extractor-sa-dockercfg-jvwp2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 45925be2-ddb8-49cc-ab76-b1976b497083 resourceVersion: "44318" uid: 9bb4a9ef-3d49-4198-9815-e1cbe2a32c47 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-18T15:26:12Z" service.beta.openshift.io/expiry: "2028-04-18T15:26:12Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: f686dac1-aa06-40f8-8d1c-d7c129a085c0 creationTimestamp: "2026-04-19T15:26:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f686dac1-aa06-40f8-8d1c-d7c129a085c0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-19T15:26:12Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: f686dac1-aa06-40f8-8d1c-d7c129a085c0 resourceVersion: "7781" uid: e7ae6dbe-2288-43e1-9358-c2440f3e1aa8 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-18T15:26:06Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 4de1e6a7-9c1e-444a-bef4-eb50669b26df service.beta.openshift.io/expiry: "2028-04-18T15:26:06Z" creationTimestamp: "2026-04-19T15:26:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"4de1e6a7-9c1e-444a-bef4-eb50669b26df"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-19T15:26:07Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 4de1e6a7-9c1e-444a-bef4-eb50669b26df resourceVersion: "7644" uid: 7e5878b4-8145-4232-b314-ab33c4804b34 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-19T15:20:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0b5ddf56-61cd-45e8-a653-986f0f5c146d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T15:20:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T15:56:30Z" name: operator-dockercfg-slt85 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 0b5ddf56-61cd-45e8-a653-986f0f5c146d resourceVersion: "44327" uid: d21c0a67-0d3b-44f1-9250-604c7d6305cb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46493"