--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T19:02:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:02:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"111b2515-b602-4d8e-b045-5d9e210cc9b6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:02:52Z" name: builder-dockercfg-s2xdw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 111b2515-b602-4d8e-b045-5d9e210cc9b6 resourceVersion: "4093" uid: 88d5df6e-52b8-4c33-b55f-cabed35b07a6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T19:02:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:02:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"42ba5f98-350b-4258-9247-addc07a214b8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:02:47Z" name: default-dockercfg-pnctw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 42ba5f98-350b-4258-9247-addc07a214b8 resourceVersion: "3605" uid: f14c2d72-694e-4643-8d4c-ef04e71634f6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T19:02:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:02:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ca1635cc-9f0b-48d0-aea3-ae16cf1c1aa9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:02:52Z" name: deployer-dockercfg-n5v8n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ca1635cc-9f0b-48d0-aea3-ae16cf1c1aa9 resourceVersion: "4106" uid: 6015222c-0255-401a-94e7-3f8ad636aeb9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T19:02:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:02:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"34fc4423-f658-46ad-a430-dc5f6f172d93"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:02:47Z" name: gather-dockercfg-5wjdh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 34fc4423-f658-46ad-a430-dc5f6f172d93 resourceVersion: "3606" uid: edf58722-b6f2-45b6-81f3-4c4b099a2d2b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T19:02:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:02:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"00f47b89-10d1-4c3c-88ea-2b2ceb828d31"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:02:47Z" name: insights-runtime-extractor-sa-dockercfg-vg9n6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 00f47b89-10d1-4c3c-88ea-2b2ceb828d31 resourceVersion: "3610" uid: 42c37828-4e6c-4dc9-a413-988adbd17313 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJS2t0aHJhUzBnWVV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzRORGt5T1RBZQpGdzB5TmpBME1qSXhPVEE1TURKYUZ3MHlPREEwTWpFeE9UQTVNRE5hTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFPWUZpSnh6SXp3N0NRNkZxai9pejNsTnpOU0N6TWYvVXc1Um9VWWpBbThqbkxpSQpBYTBXbTgyYW1KL2NRQUZ0RXlpNlJWbkdmME51Y21adW9ZZit5eWVkNXFUWklTc1FUNCtSZnYvMTZGeXQ2MVFVCjlKak1Hdk9VUGhZRi9rcTRLYkNSSFA5eHJMa1I2NmNHUzVMSHdrU1J3RVBXY3Nldk1HSjRDTEJRK2xwQ1Y3cW8KcGRJZFpzZjQ4ZUtvNno5UHF3K2xHZy9xLzk3ZC93aFNsa09lR1oxZWg5OUl1UE1zQ2haY1I3TlR4VWVLWkJMRwo3cTB1WFNCRmJIRHVkMWRYQWN5M1o1T1dyaUJhZmxEaUh3S2tyRG1MeFN4TDRGT0hDRVRUbVJFN0RMRUFNN1NCClhNV29nVCs4U01CLy80VkdxTlNucXdrTFJHNkZ3TXBhTGVzeE93OENBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCUW5HMThXSS80cW5aQkhFaHQ1S29aMy9vZ1hlVEFmQmdOVkhTTUVHREFXZ0JTRHVQazhvQTN3CkVabzhTdm5oYWs5a1gxNjNkekNCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rTURFMFpEUXhPV0l0TWpjNU1pMDBPREptTFRnek1qTXRNRFJoTkRVegpZamsyT0RnNU1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQ2VGQW9XckE4WnJlWUtpVHVxd2tpd1VuUHMwaFZ4CmlMTnRhb2xucUl6UENHSzU3M3NmZkhmVDZNQVE4eWx6UDJYQzZEQnZtODBCUXh6SGZHM2UwQ1J5enRLajIraUcKUDBzdWFDWkl5MTByb2xPY1hvRS9vbkNHU3ZhSWRVTTFsQStmOHoybDB6WjBNQkhQTW5sa25vSkkwNmpVWGd0WgpOb2o4N1ZkUzNXV1hwTC9qaTUrd3NpVzVKZmNSTVlGbmNaMmZXbVk3NVNKak04RHFyUDFVWW00VnlQSDQwRmowCkVSaVVMQkhhclFKUjIvY05CRzhSODVnR2NMSnBXL29OeU85WER2ZFpZL0UvSmFnNFl3UE9sTjBTcjlXSjFGN2oKNVdhMzNkbGlvNzdnUWxNUC9RNjYxaVBseDRpUExMZFFJNDVwT2VGRVRIUDh6RXk0V2N0QmtZcGgKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlMT3JiQkYyS0xxRXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnNE5Ea3lPVEFlCkZ3MHlOakEwTWpJeE9UQTRORGhhRncweU9EQTJNakF4T1RBNE5EbGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTRPRFE1TWprd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDdU52dERnMVZ3ZC9zeVJrQXFyQS80SXVzbVQ5eWY2TW5LCnYvVVpVN201WWJUYW5TaC9vL3pTUEdqK0R2UHdUaDZkU2FzYW5JVjM1Ym9rZmNTbWFvN1VydDQ5NXIvOHlTYm8KeFZacW8xaGF1Vk1vcW5vb0c1Y1dENGJHbGJ5T2R5K0FFcGFNcStkVlV0YWpUM2R6OVpJQmdOeng3VHFNdlFqdgo2SHhUNTkwQU9UZ1hZRTZlL2ovem44Undhci8yeDRULzRBcFpHYWdqbW1Ub3NMWituODRpMFRSQU1zd3ZtNllSCjlSeWdoajRyMG1qUGMvR1owZnYxaHdZV0ZwMVZYWGp3NjhYR3UrTENRMnVsTGtUeFFJZ3VyUE8xQWFvb2lEbnMKYzgvMWphMHZXMkFXNTE0TEpuSGg5ZXp4aldaUmVGMVpFbnVSaVZhcS96ZVRtZVIrekNKVEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU0R1UGs4Cm9BM3dFWm84U3ZuaGFrOWtYMTYzZHpBZkJnTlZIU01FR0RBV2dCU0R1UGs4b0Ezd0VabzhTdm5oYWs5a1gxNjMKZHpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQW1CNVBSMC9vRjRldW85T0FRM2tpaG1DdnBGbjN1eGJGaWRkSQpPWjkyNkRvd3JraEtIN2J6Zkt4c3dMbk9GdzE3VWZLNEJLTTFPWU9lZ0NBUnhMVHpOc2xZSUpJMm1VTU5EelQxCkxzRHZhVlQ2T0tTSFpzenhGMG5aajlPR0J0Q1oycUIvSmZYSGxIbUtES1JoYnZabnhkQ1NQQVlQc3pxRjB3NGwKbTRXWDArWFpyNlpjSzI1S0xzeTlndWI5OVVsNlVrS0UvaHFQdmZyaFhXYktTai9DUGJmcVZkR2xoYitMbEI1YgpzNExQOUJtYWlpblkyZndQTE0zL3ZKc2Fya0tFK3kwellnR3ZQZGtDbnZ2TEppZS9pK0JmWmZZQ3ZZTzdoL3BpClM2d3BkbGtpWDhoRi9rRWtCODRIQ0dhcXNUNThMOWMwQklnQ0pDcjkrOE1ocVcvQ3dnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:09:03Z" service.beta.openshift.io/expiry: "2028-04-21T19:09:03Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 014d419b-2792-482f-8323-04a453b96889 creationTimestamp: "2026-04-22T19:09:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"014d419b-2792-482f-8323-04a453b96889"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:09:04Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 014d419b-2792-482f-8323-04a453b96889 resourceVersion: "8124" uid: b87d4f4f-6c71-4dca-8b7a-0e435e6bbf92 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJUEpXaElMdDZTNDB3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzRORGt5T1RBZQpGdzB5TmpBME1qSXhPVEE0TlRkYUZ3MHlPREEwTWpFeE9UQTROVGhhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQU81MVh0YStONDd4VEZFZFYzcXd4MENXcWJtWWs4YnlwclFma2Y1ZWVvTFpkVkNkRWFKKwplUzk3cy9qcXhKVDQ3VDVBU3VKMGY0d2pGcTVVcmx3WW1MRTZWb1J1bjVySHVxRjY4RzJ5YXVKenZvYVordGxBCnQ2UkkzdmJFVWJtWjNJdUdvNmhBMEFTUkt4V1Z3V3B0RXFtUnFlR3VRazZnUmpJRnNyN2hCMVBKa1dIaGxXSzEKRFVzb0d1L1FsdTlVQy9PdGdIUkJkbGJyZUFLN0VxN1BtckFoVjk3QVMvb29DV0JPM2VtcFlHaTVkQ3NVT1hRRQpJNzJQTmJTbW84bHZCVnRndnk5b2orbW1jOVVHOHRKQjhiK3NVQzAyWmpGZ1N1UFBvM2FlaEl3UkxVUmQ4UVZLCmdJNTY5SnZ4bUt3NGplSzhNQTA5d2s5ekNWMnlqbk1EcDdFQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJSUXZBbFd4clpyVTUrVk9KK2JtVE0xa1lnbTB6QWZCZ05WSFNNRUdEQVdnQlNEdVBrOG9BM3dFWm84ClN2bmhhazlrWDE2M2R6QlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkRZeU1HSXlPRE5pTFRJM01XRXROR1kwTkMxaU1HRXhMV0ZoClltSmhOR00yWXpNNU16QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFxV05PK0JyUVYxcjc4NkJ4aytId0ZRTisKY2VzUDgyZ0ZQRGpTZFRTZFF2UUFzTzZIeDQxQUo5d20yREFiVnNONXNUa2NqcEFPSlNDT1p4MVdiM2R2bUI0bwp3MTRKOTlkMWxTd1FMaEhkZzRVU2RNaWdLU0pVdDBWMk9PUDRSRkpwRU1ZVzVTMHlEMUdKVG9ZQWJKNWVCQ2kvCnhZYldxUlJ2MVdJaSs5UGswNnZDZHJUVmpQN1YzeWJta2JzcDBTNGV4ZzloQkRGZVZySERwblIyVmdHQ3l5UGwKOW82ZTkxMHdIQTNyRlJwLzdQK1BiWlVod2dQSjNSTmFXdFdDdDE4YmxuRE9LVzFGQk4vai9xemRLWUVLWVpaRApET3JXdGIvaTlGZEtJQ28rR2F0RVV0Q2FraEFxb1NYbVg3SHJiaW00dDAweFpya0F3a2RqOUNpVFpzM3JQdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJTE9yYkJGMktMcUV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzRORGt5T1RBZQpGdzB5TmpBME1qSXhPVEE0TkRoYUZ3MHlPREEyTWpBeE9UQTRORGxhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelk0T0RRNU1qa3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ3VOdnREZzFWd2Qvc3lSa0FxckEvNEl1c21UOXlmNk1uSwp2L1VaVTdtNVliVGFuU2gvby96U1BHaitEdlB3VGg2ZFNhc2FuSVYzNWJva2ZjU21hbzdVcnQ0OTVyLzh5U2JvCnhWWnFvMWhhdVZNb3Fub29HNWNXRDRiR2xieU9keStBRXBhTXErZFZVdGFqVDNkejlaSUJnTnp4N1RxTXZRanYKNkh4VDU5MEFPVGdYWUU2ZS9qL3puOFJ3YXIvMng0VC80QXBaR2Fnam1tVG9zTForbjg0aTBUUkFNc3d2bTZZUgo5UnlnaGo0cjBtalBjL0daMGZ2MWh3WVdGcDFWWFhqdzY4WEd1K0xDUTJ1bExrVHhRSWd1clBPMUFhb29pRG5zCmM4LzFqYTB2VzJBVzUxNExKbkhoOWV6eGpXWlJlRjFaRW51UmlWYXEvemVUbWVSK3pDSlRBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlNEdVBrOApvQTN3RVpvOFN2bmhhazlrWDE2M2R6QWZCZ05WSFNNRUdEQVdnQlNEdVBrOG9BM3dFWm84U3ZuaGFrOWtYMTYzCmR6QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFtQjVQUjAvb0Y0ZXVvOU9BUTNraWhtQ3ZwRm4zdXhiRmlkZEkKT1o5MjZEb3dya2hLSDdiemZLeHN3TG5PRncxN1VmSzRCS00xT1lPZWdDQVJ4TFR6TnNsWUlKSTJtVU1ORHpUMQpMc0R2YVZUNk9LU0hac3p4RjBuWmo5T0dCdENaMnFCL0pmWEhsSG1LREtSaGJ2Wm54ZENTUEFZUHN6cUYwdzRsCm00V1gwK1hacjZaY0syNUtMc3k5Z3ViOTlVbDZVa0tFL2hxUHZmcmhYV2JLU2ovQ1BiZnFWZEdsaGIrTGxCNWIKczRMUDlCbWFpaW5ZMmZ3UExNMy92SnNhcmtLRSt5MHpZZ0d2UGRrQ252dkxKaWUvaStCZlpmWUN2WU83aC9waQpTNndwZGxraVg4aEYva0VrQjg0SENHYXFzVDU4TDljMEJJZ0NKQ3I5KzhNaHFXL0N3Zz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T19:08:58Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 620b283b-271a-4f44-b0a1-aabba4c6c393 service.beta.openshift.io/expiry: "2028-04-21T19:08:58Z" creationTimestamp: "2026-04-22T19:08:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"620b283b-271a-4f44-b0a1-aabba4c6c393"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T19:08:58Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 620b283b-271a-4f44-b0a1-aabba4c6c393 resourceVersion: "8019" uid: 29c4dcd0-b9e5-472f-b5da-f85145988f0a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T19:02:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:02:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b396950-79c8-4ad2-886a-47a441935664"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T19:02:47Z" name: operator-dockercfg-fsk9w namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 5b396950-79c8-4ad2-886a-47a441935664 resourceVersion: "3624" uid: 88a56c89-bbf9-4c52-aaea-e0212b3505b9 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27276"