--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:47:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"971b98b5-c077-483c-803d-638a2e52b842"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:47Z" name: builder-dockercfg-v75rs namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 971b98b5-c077-483c-803d-638a2e52b842 resourceVersion: "4285" uid: d51eb9a3-4bbe-4561-a5e1-1c67f7c8e7a5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"126ee37d-b3e3-4e62-8844-8273cfeae149"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: default-dockercfg-jgrhw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 126ee37d-b3e3-4e62-8844-8273cfeae149 resourceVersion: "4130" uid: 7e01fbd3-bb11-46cd-b242-2db8976a5a0b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:47:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1464a47b-2025-4755-a3c3-ed363a4ac0e4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:47Z" name: deployer-dockercfg-grc2l namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1464a47b-2025-4755-a3c3-ed363a4ac0e4 resourceVersion: "4284" uid: 355f9354-69a7-4b1d-82a8-dc687db7119a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fbb6fcac-477c-4314-a2c5-1d96e7bfbe95"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: gather-dockercfg-cdqgh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: fbb6fcac-477c-4314-a2c5-1d96e7bfbe95 resourceVersion: "4132" uid: 621c7d11-9f25-4393-a98a-e68ff5bc5303 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b8189f69-ca2f-4645-899f-454cdfe5169f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: insights-runtime-extractor-sa-dockercfg-j2pjg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: b8189f69-ca2f-4645-899f-454cdfe5169f resourceVersion: "4131" uid: 160cc46b-8341-408d-a3c9-eb2b825b4435 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJRXpRbklPdEk3b1V3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTFPVEUzTURBZQpGdzB5TmpBME1UY3lNRFV6TURSYUZ3MHlPREEwTVRZeU1EVXpNRFZhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFLNXhzVHpub2VFVHJIbXRrT1RPakJzSmFNd0g0Y2YrTFhPTi9OaXRoUjdpRFdSNQpqOTVuR3FZSkRDaWhiNlFMQlNhck9EczNLYnVJWkdlZHJOZFRyTlBCeTByMzI5VzlHY0VuN2tnRUxOM0VQVWRUCnZ1NFpHV1NaTXowT0MzQ0M3NUxrYXhTcmh3THN2T0p5blpHQ3laNzVtaXp2V3VyWGg0YTZTQitabFpTcm1VTDUKQmlqVlBrYU1WeE84dEp0NjhodXg2c1AraTh4RUU2c3dvNnZndnZlT1VzMTJrTGt0cFhaZ0dzVGk5d2pjS2RBQwppZkxlRXB1eVBVWEpraEd2ckRZdldHbUhQUk93K3BmaHNiRlZjMk9jdlVNaU9RYVFNOWZ5d1ZRTVFSb2IyamdmClNRbXpKMWpBMjMzWUxxQ2RTUENpNktCVmpobXBLU3NXNHFhMnFwMENBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCU3RtcFdmSnRzdTZVVFgwM1hvdnltSDFMcDhjREFmQmdOVkhTTUVHREFXZ0JTN2NBaFpUd2ROCitpN2FjZUx2ZE05THNIWWppRENCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rT1RBM1lXVmtZMlF0TTJNNU9TMDBNbVUxTFRnME9HRXRZVGhpTWpJMwpaR016TmpjNE1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQmN1cE51SS9RVEhuUkFCMCtEOEZhYVJHQTl6RU4xClBEa2JmS1RTQ3NoSGVCcHBLSWltOU1WMFE5ZzVCYTM5dUxGcmVpMUU3cTlIa25Qb3lySGZCOWhvWktCK053bUIKbHlTQytVTkE2ZEtmRCtiQjRPR3ZmQVJQRmp0RmlwdklVMVlpYlpHOXRWeE5LdUtuc081aXBxaGN1MTQ3bGpvaAphSWR0Z2JNWHU5UjBZK0FlM0ltSEVTN1RzYWtGUEhOM21ydUdNdGZNQTE4RFFxY3ZGVE1wNFFDNUNQQ0d3NEhSClNmdmplc01RRE5NWXJRZzl2ZzFoclFBWU43VGlaOVp2OEdUSG54aytweW5YZ05jUUR4LzV0MURFL25DYzBqTTMKb2lmRWhoby8rVHR3RlpjNWwxN1VlM08xTlRMS0hqbDdWa0dGN0krS2VmT2E5blMrQWJjUG1ydzYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlIRENmcHo5OE9iRXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRMU9URTNNREFlCkZ3MHlOakEwTVRjeU1EVXlOVEJhRncweU9EQTJNVFV5TURVeU5URmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBOVGt4TnpBd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFENDdWb2xCMUppNUthRWFwNFdQeU9MaDFkT2Z2NDRCRFNYCldHVjNUZEhOYmIxWFhTWEpRQVlCUDVVenErdGlmWWlQSngrVGo2VUd2b2VQL0VtdWdzWHY5S3MxREJuL2tEelAKZEJPNzc4VTVMZXhHSTFMaFdQMVpjNWwySmFaT0dYNE5zZnlvdnhVaDZMczJCdHEzakFONXBBdGhrZXBuM0JrRQpPY3diRVNEQ3NQZjNkVDh3bUJmSVJUdW14Z1ZDWFh6a2JvdTM3UGh0UUFwK2ZJamt1Mjl1bkhQQy95YkkxZXB3Ck9MSXYyNldzM0YrWUtvMUJZRjdHT2NLZExZQzZlb3hSNmhNdWRiQWVRV2tPRENnZ2xQQkN5VG90VjRpY3BTT3oKd3V5b3RURjRvcWdWK3VWWjBKWmxMRnJDR2k5KzVBRnZGZVQ4WURnVlNzNGxxM3NkV1BzZkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUzdjQWhaClR3ZE4raTdhY2VMdmRNOUxzSFlqaURBZkJnTlZIU01FR0RBV2dCUzdjQWhaVHdkTitpN2FjZUx2ZE05THNIWWoKaURBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUliemRmZ3NicG5oMmsrdk5tUDZLcWZaM214VzV3ekV0bCtVRQorMjlrb2ppYWpvV1hrWE1EUGVIWFF4ckNOL3FoSzJqczJWcGE0SDU2dmxuS1ZZM25WM1BIdmE5VjdCY3dJMngwCk1ZOGJXTkNFcy9iM0FUbFl4QUpwV3hmL1JCcXNWeTl6REZUbFNsaTgwTEhPdUJTd0FUMXJjQ2JsU2pxZWlwVDQKckxRTzBuSHIxWXJMRnlNeUx5SG5RaFFhZHcwTDBnaHJWcGhBWkVoVlFBVXIwdFQwVGRzbEJhT3dzQ3haN1F4YwpwWHpuUGs5ZHhDbDBFR1dYVUcxZjBiOWM0WVdQMWtZanNwUmdLQS91YnM4YXJ6azc2YUxucnJtVlBxNXBpMEtjCm9BalhnWm5VS3o0VU9nbWh4SXkvV0c0UlYwM200SGdmS1VEUnVoallPYyt2cnExYThnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:53:05Z" service.beta.openshift.io/expiry: "2028-04-16T20:53:05Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 907aedcd-3c99-42e5-848a-a8b227dc3678 creationTimestamp: "2026-04-17T20:53:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"907aedcd-3c99-42e5-848a-a8b227dc3678"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:53:06Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 907aedcd-3c99-42e5-848a-a8b227dc3678 resourceVersion: "7841" uid: b5b9060f-4609-4dc5-aa9c-89b33fa670b1 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:52:59Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 21bb1bc1-1e1e-4d19-b5dc-6250ac98ebb1 service.beta.openshift.io/expiry: "2028-04-16T20:52:59Z" creationTimestamp: "2026-04-17T20:53:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"21bb1bc1-1e1e-4d19-b5dc-6250ac98ebb1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:53:00Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 21bb1bc1-1e1e-4d19-b5dc-6250ac98ebb1 resourceVersion: "7712" uid: 0ea0b02d-0bb5-4ff6-90f9-13c8d5863918 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T20:47:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d8628857-9935-47c7-acb7-d1ec6a07e8ba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:47:12Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:47:45Z" name: operator-dockercfg-hfhrb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: d8628857-9935-47c7-acb7-d1ec6a07e8ba resourceVersion: "4134" uid: 24c0697a-0f95-498f-9e18-80a507cdcb4b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26321"