--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-19T12:05:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"31f11dcb-dab9-4c23-b484-ca04c19337dd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:05:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T12:42:14Z" name: builder-dockercfg-nzd25 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 31f11dcb-dab9-4c23-b484-ca04c19337dd resourceVersion: "43861" uid: bcdc2e2e-e58a-4565-9a7f-d167ca927a31 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-19T12:05:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7dbd48cc-3cc2-4d74-8fdf-71fe58f91492"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:05:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T12:42:12Z" name: default-dockercfg-2nc98 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7dbd48cc-3cc2-4d74-8fdf-71fe58f91492 resourceVersion: "43616" uid: 1dda1f31-e47c-4197-b9fc-6a016b5e72f0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-19T12:05:51Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3f1df5d1-08ef-404d-bd03-922deac55bc7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:05:51Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T12:42:14Z" name: deployer-dockercfg-fpv64 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 3f1df5d1-08ef-404d-bd03-922deac55bc7 resourceVersion: "43834" uid: 1de1c03d-0599-42fb-9b63-b6bd83002631 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-19T12:05:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"799aad1f-17a3-4cc3-8bee-4ba99562ad40"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:05:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T12:42:12Z" name: gather-dockercfg-mhlnz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 799aad1f-17a3-4cc3-8bee-4ba99562ad40 resourceVersion: "43620" uid: 461983bb-4c59-4466-a191-08b853bde37d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-19T12:05:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ee7b5c23-a457-4c47-8789-e9042b9bc580"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:05:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T12:42:12Z" name: insights-runtime-extractor-sa-dockercfg-k9qgl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: ee7b5c23-a457-4c47-8789-e9042b9bc580 resourceVersion: "43678" uid: 53328568-a275-4159-b300-e744ec5de61e type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-18T12:11:46Z" service.beta.openshift.io/expiry: "2028-04-18T12:11:46Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 9b04b2a6-1050-4c27-a01c-a51f3b6c491d creationTimestamp: "2026-04-19T12:11:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"9b04b2a6-1050-4c27-a01c-a51f3b6c491d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-19T12:11:47Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 9b04b2a6-1050-4c27-a01c-a51f3b6c491d resourceVersion: "7745" uid: fb7a3f4d-c910-4abc-ae76-067fcec75da7 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-18T12:11:41Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 8d3f6dd6-2ca6-4f78-906a-85e791b22b45 service.beta.openshift.io/expiry: "2028-04-18T12:11:41Z" creationTimestamp: "2026-04-19T12:11:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8d3f6dd6-2ca6-4f78-906a-85e791b22b45"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-19T12:11:42Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 8d3f6dd6-2ca6-4f78-906a-85e791b22b45 resourceVersion: "7658" uid: 981ec3c8-1989-455a-969a-d52854ea1668 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-19T12:05:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7c449e9d-d0ba-499d-8c19-b09f66f0b64c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-19T12:05:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-19T12:42:12Z" name: operator-dockercfg-jngvd namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 7c449e9d-d0ba-499d-8c19-b09f66f0b64c resourceVersion: "43639" uid: b88cfdcd-3791-4d68-a198-9043eb230232 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46118"