--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T14:52:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5d002fb2-157e-4098-9ca7-ceeb23fe63a7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:14Z" name: builder-dockercfg-4bg7s namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5d002fb2-157e-4098-9ca7-ceeb23fe63a7 resourceVersion: "38802" uid: e6772c61-276e-4fdb-a60c-0866b8920ea0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T14:52:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d299c56a-b9fd-413a-bc8b-26ca46cc7ff6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:10Z" name: default-dockercfg-z4w2c namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: d299c56a-b9fd-413a-bc8b-26ca46cc7ff6 resourceVersion: "38678" uid: 7c12bef9-6602-4ab9-ad6b-dcfa5ac90056 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T14:52:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d831bdf3-7c02-4e3f-a9d3-69a743af10bf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:14Z" name: deployer-dockercfg-2h9d5 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d831bdf3-7c02-4e3f-a9d3-69a743af10bf resourceVersion: "38818" uid: 4800c0d1-ac6e-4ab2-9fa0-0b6ddfbe7376 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-21T14:52:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6502f029-d1ac-4133-bbae-07524d25dfbb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:10Z" name: gather-dockercfg-88kcl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 6502f029-d1ac-4133-bbae-07524d25dfbb resourceVersion: "38673" uid: d80390c7-e014-4778-81f3-1299191cb1e9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-21T14:52:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c525eda1-081a-44e9-bd08-90ad3deb369a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:10Z" name: insights-runtime-extractor-sa-dockercfg-s4jk5 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: c525eda1-081a-44e9-bd08-90ad3deb369a resourceVersion: "38672" uid: 6ce3418d-377b-45c5-807a-991e51aeb800 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T14:58:06Z" service.beta.openshift.io/expiry: "2028-04-20T14:58:06Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 655a1612-156b-4b87-98f5-00e41f050bbb creationTimestamp: "2026-04-21T14:58:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"655a1612-156b-4b87-98f5-00e41f050bbb"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T14:58:07Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 655a1612-156b-4b87-98f5-00e41f050bbb resourceVersion: "7807" uid: 012f718e-4e35-4d21-ac9e-246001642190 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJTUNITmM0OXdCSzh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzRNelEzT1RBZQpGdzB5TmpBME1qRXhORFU0TURWYUZ3MHlPREEwTWpBeE5EVTRNRFphTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQU1LdHNybi9aN2xiSWw3NHFvWnJmS1JHUmx2QVpmZXc4K2wvanlBeGRSeEVDc2xUVk90awp1MTdNN3V2QjJwMWhXVjlMRDJwMjZ5WXAzMnlDNUtUMGNsYTdULzhjNVA4OWVReXlNaWxGck13RnpjQjJZZncrClpxZXplS0tYWThhSGMxM2U3c1ZMRHJXU25tRVdJRFNKdUR2WUo1d2dlTEgyY2pJaUZ6VWdzcDcyOU1YNmFGQzYKeWkzL2p6MXFrSnc3VXFCRkJuenR5U2lUMkJvcjhWZWtmR0JFMG1Za1ltU1ZZeHhIWVVtM09TU0FlQ0xhanB6cgoxTmZUNHpqbkk1QnBGZUQyM2FvVzNicllPajVpNWFmV3FxTGlxMHNtNjN3cFF0ekJua0Y0WFdvSC8yYzc5RDdJClU5N2sxakFMWnJzRjYwWlZ2UzBpKzl5YTlPUHhEZ09tV0hrQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJUd20rZDIzdFNDNHc5QWh4UUZueDlyRW96WGREQWZCZ05WSFNNRUdEQVdnQlI2Uy8rbURUZndlTkxZCnhKb0pETWhaT0thQmdUQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkdJNFptWmtORFJsTFRnNE1qa3ROREZsTmkwNFpHTTNMV1prCk1EYzFaalkyT0dZelpqQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFKWFpKUGoram1Jd1pYME5nVHM1TksrSmcKckRldDFoY1NPTnQ2MlJNbEJYM0NXcTdCWVJETHVydEtuT1M1MHBsUU0ybHRPZzN0cHUvVXg2bEl5RjRnTE5SMQp5VHgrM3BnM3lsanVqL2ppVlJRdVFIaUg2MldnZ3VtaUJCeGVOR0RtWUsrYXdocFBYQXNWcEtYWjRtSkdOTFd5CkZuK3lJa250eG5nM1hRM3l5ckxpcGhVZ090WmlNQVB2elBhL2R5V044RTMyMWxmQUpmbzgxWUhpcUxWZ0t0a3cKZ2R2RnVvNThqalUrUkYvM1VUOEVMZmRYcERuUytQM1BqM1p1Y2V5ZDc4Y0NkQy90UTFxV2pnWk92QnNhdWV1Ngp5SVlqS05EbXlsczZXVS9TQjh1NCtCUk11d2xkTlJ1b1ArRjdqM09BbVdHcmk5RU5BR0hPY0YvbVFmQUZXZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJWDc2ZlMrUUpIRU13RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qYzRNelEzT1RBZQpGdzB5TmpBME1qRXhORFUzTlRoYUZ3MHlPREEyTVRreE5EVTNOVGxhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelkzT0RNME56a3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ3lycjFXOU8zaFJmaVRtSGIwamhscVlEK2gra2xUL1NBcQpVZHJjcW84VjR2cGpXTlk4SHdUREVRYXJUbE5SNDEwZWVTZWlJbFZCT3RqMDV1ek0vN29Vd2E4U2k1RVBoQmRpCkVVTS8vUmg0cFNBcXU5eEk0MG8zN2s4byt3bWh3em93cElXTS9DTDNreXZ3RUtQcmVpU1U5RC95dWJzRDZjQXUKd2NSYnBSQ0llMDlKWU1hc0hCditJMkh2WXlVa0hHMkx3SzJDQVRFRkdOeWlNdzdhalFZZWNTQ05uaHo2em1FdApqaGJOdVlvMlZtbWRoam5DaDlZN2xFQ2xuYVpabjdqTGN4MnJ4QVppc1FJNnJXY2h0aGg5UUhBS2wwM1pnVXh6CkZpQ2dqZlc0cDdGblBFc04wakNJQnBSNTZ5UGlCVWNEV0l1SmVRaitPaFZubW44MVFFWi9BZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlI2Uy8rbQpEVGZ3ZU5MWXhKb0pETWhaT0thQmdUQWZCZ05WSFNNRUdEQVdnQlI2Uy8rbURUZndlTkxZeEpvSkRNaFpPS2FCCmdUQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFjaGVaQkV6Mk9DNjBDZHF6VU5FcUpXYkd3bEQ4STdQdGxDNjEKVzZ3dlhLQmZsT1JSZUQ3cXYzRWpvSVl1Y1VMUU1lTTFmL3M1WktDeEh3L2I3YUNmaHRZYjBBM3NlMVpZNVBkZQpuNDAwNTlHQnpoOWVYN1JDMVlMVDBLZXRwb25YU3hSOEtITVRtTm5oVzVGZC9sejgydTZqNW1uK0N1Rk9qZmdYCld4SThSRUVyNzZBWmNMRFFsYVUxdDVRamFCaVI0ckVJODljc1c2aHd1Njg3V1BaZTlvdVYvbDFSelZmT2JMZ2kKSk42cUlMdVlpVllXYmhTS0NyWG1qZ0VOTlRvZ2hUWlQzSjZWTi82Ti9rbHZzWmdSUERMRzJ2TnhPeHVmT3Q0SQpXWWZ5WnJ2enpLS09VSGhva1hJbnh2eFlQbWJoZUd2cTNlRUN4L013T3VDQkFBL29rUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T14:58:06Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: b8ffd44e-8829-41e6-8dc7-fd075f668f3f service.beta.openshift.io/expiry: "2028-04-20T14:58:06Z" creationTimestamp: "2026-04-21T14:58:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"b8ffd44e-8829-41e6-8dc7-fd075f668f3f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T14:58:07Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: b8ffd44e-8829-41e6-8dc7-fd075f668f3f resourceVersion: "7804" uid: b131b15b-1c72-4d9e-a5f5-e41ce498025f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-21T14:52:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"44dd1e8e-52f1-4049-884e-2abbc02ad86a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:52:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T15:28:10Z" name: operator-dockercfg-kv55b namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 44dd1e8e-52f1-4049-884e-2abbc02ad86a resourceVersion: "38686" uid: 924c7510-5b6f-477b-97c6-b5944f36bb7e type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46643"