--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T06:59:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b4955f8-72d1-4abe-9887-231400370e37"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:52Z" name: builder-dockercfg-zljfr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5b4955f8-72d1-4abe-9887-231400370e37 resourceVersion: "38820" uid: 4bbe7666-b540-4778-8f57-218b7809f5fb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T06:59:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"081b6972-86f2-44f6-a923-2bab1bb491d8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:50Z" name: default-dockercfg-vk9c2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 081b6972-86f2-44f6-a923-2bab1bb491d8 resourceVersion: "38729" uid: 3b4ec58d-9a18-416e-b83e-4a6f6f79e700 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T06:59:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a497a1dc-0395-4402-9311-bc289f74c77a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:34Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:52Z" name: deployer-dockercfg-8764s namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a497a1dc-0395-4402-9311-bc289f74c77a resourceVersion: "38868" uid: a72f76e4-b513-4367-8b98-1bf5c09c3cb9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-20T06:59:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3550dc82-2c29-42cb-9799-8dfdfbb03fa9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:50Z" name: gather-dockercfg-hgh56 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 3550dc82-2c29-42cb-9799-8dfdfbb03fa9 resourceVersion: "38604" uid: ef720384-f0a3-43da-8150-be537b6f7bd4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-20T06:59:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d66d66b6-58f8-4746-bd41-a935c3fcbe30"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:50Z" name: insights-runtime-extractor-sa-dockercfg-nfwjb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: d66d66b6-58f8-4746-bd41-a935c3fcbe30 resourceVersion: "38750" uid: 9d73acf4-156b-4e84-89bb-6032e1b3d9cb type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T07:03:34Z" service.beta.openshift.io/expiry: "2028-04-19T07:03:34Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: f2c2b432-0547-48f4-980c-7555946f05c8 creationTimestamp: "2026-04-20T07:03:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f2c2b432-0547-48f4-980c-7555946f05c8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T07:03:34Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: f2c2b432-0547-48f4-980c-7555946f05c8 resourceVersion: "7152" uid: cf8cec1f-2cd3-4383-97d6-66ce9b2bf6d4 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T07:03:34Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 0203abba-9013-47f1-9714-2873ffb40f17 service.beta.openshift.io/expiry: "2028-04-19T07:03:34Z" creationTimestamp: "2026-04-20T07:03:34Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0203abba-9013-47f1-9714-2873ffb40f17"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T07:03:34Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 0203abba-9013-47f1-9714-2873ffb40f17 resourceVersion: "7165" uid: caff4a8d-b9a3-4828-be16-c27932997418 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-20T06:59:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ba92903c-0122-4335-8e54-ad60f5b050ff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T06:59:29Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T07:35:50Z" name: operator-dockercfg-c4psp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: ba92903c-0122-4335-8e54-ad60f5b050ff resourceVersion: "38627" uid: 6a1d5a43-38f2-4024-af95-fd8dd56b7299 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "43301"