--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T01:06:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"716fded5-80fd-4ed6-9afa-36ee676264c5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:43Z" name: builder-dockercfg-xm45k namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 716fded5-80fd-4ed6-9afa-36ee676264c5 resourceVersion: "44725" uid: 136694b5-52e9-4d9c-b61a-41607d72b3d2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T01:06:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b505aa8a-2265-4c93-b9b2-93179a52a85b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:40Z" name: default-dockercfg-kwdfw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b505aa8a-2265-4c93-b9b2-93179a52a85b resourceVersion: "44442" uid: 4f3a9d53-52e8-407d-83d7-d31e818193c7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T01:06:16Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"887841ea-7e0e-45d6-8575-ee551489e5fa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:16Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:43Z" name: deployer-dockercfg-djc76 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 887841ea-7e0e-45d6-8575-ee551489e5fa resourceVersion: "44770" uid: 7148b841-0dcf-4750-87f7-7ec05516b684 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-23T01:06:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"95774252-a7aa-4eed-9ce7-383ef00f9a70"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:40Z" name: gather-dockercfg-sm4xb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 95774252-a7aa-4eed-9ce7-383ef00f9a70 resourceVersion: "44466" uid: 9046440d-cc74-4e94-a3be-5d1673190751 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-23T01:06:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7c165026-29ca-48d3-837a-a873a24ea120"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:40Z" name: insights-runtime-extractor-sa-dockercfg-8pwvt namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 7c165026-29ca-48d3-837a-a873a24ea120 resourceVersion: "44482" uid: 74ef648d-4e03-4949-8dae-8e5dd7c6568f type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T01:12:06Z" service.beta.openshift.io/expiry: "2028-04-22T01:12:06Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: d5a09eb5-7bdd-427b-a229-f3a029ec40aa creationTimestamp: "2026-04-23T01:12:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"d5a09eb5-7bdd-427b-a229-f3a029ec40aa"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T01:12:07Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: d5a09eb5-7bdd-427b-a229-f3a029ec40aa resourceVersion: "7749" uid: 598a280e-a91a-4e65-a223-60dcb94e8682 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJZDlUb3BFTm4zM013RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qa3dOamN4TnpBZQpGdzB5TmpBME1qTXdNVEV5TURWYUZ3MHlPREEwTWpJd01URXlNRFphTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQUt4clB0T1BBeTZCUzRaRkI2SVViSC9VTzA4azUxMjVwSldPb05GUnQ0QXNzRTRxMXcrcgpYeWJ2TG9aMWovdkFGbk5lNUV1UE1yWTN1bXhYSit4UGs2UXVKbFZKTkZHdkRZVzJ2bHR2VzNEWCtScDdVMis0CklNSFhrbm8rTVFiQUZ0ZkcwVGFXZktkUVpOZ0ZJNFZQSjBwRUtMQWE0T201U3RLcVZwT2xPVnJBdDZ6RFNpTnYKdlJLVmZMcU0xL0hQR1ZpcTNvbFd6dWlVc3JhR2ZVb2JoUTVBYnB3SVVDcFJNL0cxZlgwcHI0dlI3NXpMc1VpZgpRVmxoMWZMOWZzWDZyK0lKbVdRRlNkZ0ZPZjg3TGJlMTVSMFVxRkcwZk9vdXhkRWZ0OFhuYW9RWENnajhkRWNUCkNRZzU5OFlXS1FQenZ4ZDYyYmRwdVJSNGlmMUVlTTRqNjhNQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJTNk53NGgwRG42cEZ2UEhtN05jRk0xQlRDQXFEQWZCZ05WSFNNRUdEQVdnQlNpTWk4cXBSdVR4a0M4ClV2Q1JtenZQTDU5alVqQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkRVNU1tWTROakkxTFRobU0yVXROREJrTkMwNU1qRTRMVFk0Ck9URTJNbUUxWW1NM1l6QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFic2dZY21jWit1V2t4MlFkb0k0UDROMloKS2lpWFRUcUR5MjgvY0lKcEgvNDF1RWoxaExoeExoclJ5cGczT2NJZm9rcmw2N2R3WStzNFBRMGN2S0hyNXY0YwpLY0RvNVYxNlNCTHIyNk50Q1hyLzdEN1lNTDVTbFRENmxlSGt5N0JzWkF2dlBuYmkxeEFhaXRYeVRNNWppZ3Q5CnEweVc0M09VbFZiV1N0RGMyQmNXT3NFV1l4VTk3YkM2SVc1LzZmbVFaL3RuSHZhcHNNZ0dlakYwZzRiUVBacXIKY3huM0VHY0NkcjhBTjNDYmVhczBSbWpYNExLQlM1WFl4R3FZU1lMVkRsT01rZVZ4aFRYemJ5dFdmRXVmWjI1VQpqNk40b0pvcUYwbHh0T3JTVEwyNmtuUTlhTnc5Q2xrYTFiOVZjM0Q4K0lrVkgrZG9ZOGNXZlM2UWdJK1podz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJV1R5RDZZTkhhZFF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qa3dOamN4TnpBZQpGdzB5TmpBME1qTXdNVEV4TlRkYUZ3MHlPREEyTWpFd01URXhOVGhhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelk1TURZM01UY3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ21aREl5MllXSlQ5STgvTmdIakJwT1VQY0hBajQyYWt3TApWYUtjd1Y1TDhOeVZIS0VTL3Uveml5SUJLaThJV0JVRU5yS2thUURGV0lpaS8wZDVVMjZDWm12RHhKUHdjRzZVCm9WQ3JYNHJaMEx4WVRLM2ZKclVKblZ1Wm5kUnNIZm5ZR004RUlPbjFZOXhEKzF1b3k1RWttYkxoaFA3dWRVL2QKNXo2OHVqNXNYbG5JVVN2dkJFaytzdTNISnZzUktLN3liN3g1ZVl4TzRlOXgzdEJVMVd5VS9ldzltSDcwNktCNwpXdFFPZkFyeTNSU3A1MXlXNjh1Zk0xd2ZvSEtGL0EyZnNhU3NTckt4bHlRdGMxZVUzVlIzQzZOcDdzdkVhaVBLCjJlRFFTSkRaSzc3bTFtNnlVbWRRcm5RRWd3R3VMMFc4WjN5YmpLNkxoUm04V1V0YlVUempBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlNpTWk4cQpwUnVUeGtDOFV2Q1JtenZQTDU5alVqQWZCZ05WSFNNRUdEQVdnQlNpTWk4cXBSdVR4a0M4VXZDUm16dlBMNTlqClVqQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFJZ0VGMGtzdzArMGMzam9zZVJpRVVBVjhyUWlENlphSVZCY0wKWlJIY3hKcjBrZ29yUzBBWVNHU3BNSXBYUlNsSngxcnRiZXZHbUZjRjBCZGlLOFROTXJXRkVNdHhEN0UwemhCYQp3Tk11ekJEYmtMeGZkdTdZUk45WG9od015Yk4xaDZmUGVaU1NBakJXdjdKMWoySHNnYlVBenRoTndOa2hzQ0hYCmRFNnpZQjVrTmNTNG81ZFNoVVBPbnRJRm92NDM2NnJDZ1Zrd3BlRmd0WFk2eFpBb2xucjRkc2ZxUVZBRkV0ZXoKYmZTaE43cytXODUxYmdraHRieUV1Wk1ENGdjZ093aUdJbmdCUWxPRW05NVl0TmMrbEhQS0xJVkF2VVdSbm5FSApwSk1LSWtaVm02Zldpd1dETk1FbFRQUE56TEdMWXZWSUgya292T1RvbTBuVVYwNVhvQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T01:12:06Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 592f8625-8f3e-40d4-9218-689162a5bc7c service.beta.openshift.io/expiry: "2028-04-22T01:12:06Z" creationTimestamp: "2026-04-23T01:12:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"592f8625-8f3e-40d4-9218-689162a5bc7c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T01:12:07Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 592f8625-8f3e-40d4-9218-689162a5bc7c resourceVersion: "7747" uid: 304ab523-ec12-43da-a38d-9f07c498cc75 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-23T01:06:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0e295c09-617f-47b3-ac27-e7f9aca0fcb9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T01:06:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T01:42:40Z" name: operator-dockercfg-x88z7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 0e295c09-617f-47b3-ac27-e7f9aca0fcb9 resourceVersion: "44450" uid: 85243d74-d587-4eeb-86f3-fc67d12987f7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46407"