--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T23:22:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c0cc0739-4147-40ff-9963-576bf59c6ac4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:22:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T23:58:33Z" name: builder-dockercfg-5db74 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c0cc0739-4147-40ff-9963-576bf59c6ac4 resourceVersion: "43590" uid: ed20f8cb-f24e-4164-b9ee-4b88bbd905b0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T23:22:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dfaa9cf9-230d-4643-bf38-4d8d2593d67b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:22:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T23:58:28Z" name: default-dockercfg-s6x4z namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: dfaa9cf9-230d-4643-bf38-4d8d2593d67b resourceVersion: "43342" uid: 5efff21b-5dc8-4f9f-91e4-843b37b00dc8 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T23:22:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"68a6ff87-6e05-446e-bb8b-631b3e9a027f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:22:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T23:58:33Z" name: deployer-dockercfg-4vp22 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 68a6ff87-6e05-446e-bb8b-631b3e9a027f resourceVersion: "43602" uid: 8fe91ef0-13fc-4042-81fc-ab1d398ed8a4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T23:22:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e3970081-d11e-4948-922c-fad95bc9a8b9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:22:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T23:58:28Z" name: gather-dockercfg-5n9tk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: e3970081-d11e-4948-922c-fad95bc9a8b9 resourceVersion: "43354" uid: d3ccab67-66f6-47dc-b7d2-06479b46d2f7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T23:22:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"883196f2-78d3-4688-8fe9-d05c98505390"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:22:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T23:58:29Z" name: insights-runtime-extractor-sa-dockercfg-jrpnr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 883196f2-78d3-4688-8fe9-d05c98505390 resourceVersion: "43388" uid: 570c718b-0ebd-4289-912e-4923b3956395 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T23:28:21Z" service.beta.openshift.io/expiry: "2028-04-15T23:28:21Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 15559c1c-9618-401a-90ca-6335a9dc0776 creationTimestamp: "2026-04-16T23:28:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"15559c1c-9618-401a-90ca-6335a9dc0776"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T23:28:22Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 15559c1c-9618-401a-90ca-6335a9dc0776 resourceVersion: "7772" uid: f0b6efaa-e77a-4dc5-80fc-c986aeafa153 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T23:28:22Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 6b466dd3-fac0-47e2-8ce7-be262e72a487 service.beta.openshift.io/expiry: "2028-04-15T23:28:22Z" creationTimestamp: "2026-04-16T23:28:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"6b466dd3-fac0-47e2-8ce7-be262e72a487"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T23:28:23Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 6b466dd3-fac0-47e2-8ce7-be262e72a487 resourceVersion: "7780" uid: 3da29ac4-6142-4f3c-98f8-56de65e986bf type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T23:22:28Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"04acdd0e-79f0-4bfb-8f65-55ada2bba74e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:22:28Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T23:58:29Z" name: operator-dockercfg-sp6bs namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 04acdd0e-79f0-4bfb-8f65-55ada2bba74e resourceVersion: "43402" uid: 3f7c5761-518f-451b-9f21-20ed54c2e61e type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46383"