--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T14:26:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4f5a5772-acd8-4784-9c9c-1ebcd3077754"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:38Z" name: builder-dockercfg-c587r namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4f5a5772-acd8-4784-9c9c-1ebcd3077754 resourceVersion: "4260" uid: ea07222d-30bf-4dbe-871e-6d462490d7ae type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T14:26:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"585313f8-6389-402c-92cf-db279523ea19"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:33Z" name: default-dockercfg-vdhdr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 585313f8-6389-402c-92cf-db279523ea19 resourceVersion: "3752" uid: 87358505-5f71-4cd5-879d-18da22341f87 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T14:26:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"68bc2c93-c1e5-4d1c-ac6a-b6f50b602975"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:38Z" name: deployer-dockercfg-xz64l namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 68bc2c93-c1e5-4d1c-ac6a-b6f50b602975 resourceVersion: "4256" uid: 2b2b471f-189a-46e5-97ef-6896b1225a98 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T14:26:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fd0160af-2e2c-4e66-871f-bdc8d45447da"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:33Z" name: gather-dockercfg-fjc7z namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: fd0160af-2e2c-4e66-871f-bdc8d45447da resourceVersion: "3753" uid: fe8495b4-e0a4-4be0-af3b-3202477fee93 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T14:26:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e9e216fd-6652-4e71-8401-ac1b03c56c6b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:33Z" name: insights-runtime-extractor-sa-dockercfg-k65jf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: e9e216fd-6652-4e71-8401-ac1b03c56c6b resourceVersion: "3760" uid: 5e3a404a-0c5e-4e08-b0f0-4ff77205742c type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:32:06Z" service.beta.openshift.io/expiry: "2028-04-15T14:32:06Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: d07c25fd-bf3d-4ba0-84fb-f9c2d53c6a05 creationTimestamp: "2026-04-16T14:32:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"d07c25fd-bf3d-4ba0-84fb-f9c2d53c6a05"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:32:07Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: d07c25fd-bf3d-4ba0-84fb-f9c2d53c6a05 resourceVersion: "7828" uid: 9108cd2b-28a6-4f58-a2c8-36ef27b5fda2 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T14:32:01Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: cd50a30d-a255-46a4-9277-cdc032688b31 service.beta.openshift.io/expiry: "2028-04-15T14:32:01Z" creationTimestamp: "2026-04-16T14:32:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"cd50a30d-a255-46a4-9277-cdc032688b31"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T14:32:02Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: cd50a30d-a255-46a4-9277-cdc032688b31 resourceVersion: "7721" uid: 66442855-ca4a-4358-a19e-63d02c2ac239 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T14:26:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4c55edc2-e4b8-4aa5-a4ce-75ba57fb1dfd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T14:26:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T14:26:33Z" name: operator-dockercfg-s9szl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 4c55edc2-e4b8-4aa5-a4ce-75ba57fb1dfd resourceVersion: "3765" uid: c5f37406-e60a-49fa-89c2-a7f9a237e0ec type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "29476"