--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:00:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c51edbfe-541d-4891-8b18-0ac713d0bcd9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:10Z" name: builder-dockercfg-dqd54 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c51edbfe-541d-4891-8b18-0ac713d0bcd9 resourceVersion: "3875" uid: 672fe5b9-c29f-408f-a696-ff1361dabec5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:00:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c57540a9-e062-4317-a963-ba753e1f88bd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:06Z" name: default-dockercfg-82hjc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c57540a9-e062-4317-a963-ba753e1f88bd resourceVersion: "3219" uid: d9628c24-c2bb-499c-80b3-3bf8cac7035c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:00:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5be9befb-f281-489c-bc54-ec07ce1c4054"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:10Z" name: deployer-dockercfg-nvc55 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5be9befb-f281-489c-bc54-ec07ce1c4054 resourceVersion: "3876" uid: 0017df10-ec46-49d9-b696-cf95ecfe785b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T20:00:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"85abc657-aea6-4de0-8288-22aa4df1c1c2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:06Z" name: gather-dockercfg-8z6k4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 85abc657-aea6-4de0-8288-22aa4df1c1c2 resourceVersion: "3229" uid: e31b23c6-6d89-4852-bb38-ffa67af985c6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T20:00:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1979e045-45d3-48ec-9453-c79915f8ba26"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:06Z" name: insights-runtime-extractor-sa-dockercfg-zcfv7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 1979e045-45d3-48ec-9453-c79915f8ba26 resourceVersion: "3231" uid: e257bdff-6f35-4916-aedc-8a472466e566 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJUFJqTERFMXJvU2d3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTFOak0wTkRBZQpGdzB5TmpBME1UY3lNREExTlRCYUZ3MHlPREEwTVRZeU1EQTFOVEZhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFONCtoWjJPeExvKzA5ekE0TEY4U21LT0VzcnFUWkg1ZnVyTlBNblZjbjlNeTRmUApkRXpINlRhYTdUV3ZreFVBQ0JTT3ViQjFocGVUODNzTXQ1cnp3SWErUlhTTzd2VzQ2K1F0eXAramNOcm13M2hOCmszbS9sbTBLaThhOGVBV2Q4RU5SaytoRmNtZ2NOZlNodmlXS2pIamNoZkViVDRZVmkvSE5lYmdBN2tQSWYrdUEKUmQ2Ujd6RUpsdFV4M2RQLzlmeVk4NWdJNUJqMXFoc0pobmYxS291VEJxc21YSStqaWJxWUZxWlR4RjVlK0dKeApZVUZ3cllkeWdNd0YzdVFPOVlQQjZwdFphWVBibllMS1QwdU1WdURtUVFydG1JQ0hEc2VTa0ZOQlo4NFhLTG5MCmttUHJQRXlqRGE1TlZmaFBZZExWK01IV2JRbEtDRUlvZFVQRzZIVUNBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCUkFmc2NJY2VxOEhoYmVwbWF3WWhEMWV6OXhuREFmQmdOVkhTTUVHREFXZ0JUTlRlUVpIZEltCitDM0p5RHFOQnp0bjdPbFQzVENCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rWkRNNU9HVXlZVFV0WldKaE5pMDBNbVl5TFRnMlpURXRPVE0xTXpWaApZamhtTUdJeE1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQ1RwaDA4M0NqM3lIemdZT215TG82TVMyVVZpaDcxCklLMXNNZDlhUGlHY25KaEdvbzZVUGdUOXFSSHNPZEdCbkluLzJwQWFKM0xGYnVKQ3E3NWZ5Vy8vek9wbVRaNTgKZXVBVkJ2WkR6QXV2SWgxdkFhR1cyUFZyT0tkVnJhVkQ5bmtIZXpndXF1bEtreDZ0Q0NHM1hraDJ3RUE5dEY5QwpkZk01OGtEbGREVGR3SUR5VVBrUDZ4cFNuM0EzK3FoaVUyUHhiTk1pc1BQRnRhL1NsRmwzZFZ2NlRYYjlrZWIrClFFQ2dJc2xGZWROQlcycVl0UGVLcnlXb1ZPUEJ3aTlNOVFuUlVad2IxZEduaE5VSTNUK2VsNGFZbUpTeDVMNWgKcjI0ZnY2QkFJQnpGU29neHhQMHY3dG1DTHhNUW1rejVNMWpmVG9oVnFrSmkxSlFUMjJtQWgvLzIKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlBUFBkK2xzd3ZFSXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRMU5qTTBOREFlCkZ3MHlOakEwTVRjeU1EQTFORE5hRncweU9EQTJNVFV5TURBMU5EUmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBOVFl6TkRRd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDMWN2SVRVUWswTWZqSVJvOHdLR1BoNk8yTXhLNGVpTEh2CmY3eGJTVE9JTjhmdnYxRDgrcGNaelFFR1N0MWR0R2VsSGFsV0RGc3FoYXE3MTdXTXViTU9zVVdZbjBoSXJnWUMKbUpOYys4cmZyODNZRTZrc2x3cHRoU1FCNW9GWEhlVGxOZ3p3S1l6NEtuNUhDMUlEam0rRUdsQ3FTYzU4a0ozSwprb2ppTTZpL2pyUTV3dko1QXpNVlpFQ2JNbnNabDQxM1JqSzNiODBuNGlhYUkxV2ROcnd3aHU1cFlwOXFyNHVKCitiR0NzWHVtZDAxTVpJMGFKMnM3TW41UmkzT3VFdk4vaGQ2bFU2Qm1JbDBsSGsycy9BWXJTK0VCNHFuWGFVR20KWDJYQ3pIeFdGZU81dmQ3UEE0UStJcE5vbXh3a3JycHhwem0vbFVPa3lSV05nMDJZWXkxZkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVE5UZVFaCkhkSW0rQzNKeURxTkJ6dG43T2xUM1RBZkJnTlZIU01FR0RBV2dCVE5UZVFaSGRJbStDM0p5RHFOQnp0bjdPbFQKM1RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVVyUHhnR3RPR2FETkF2L0VkQVkrVS9rcm5nam9yUDhHVSttego0NkxJS2kwY29jakJIeHYxNHpZUGpkVUpkUldGTzRqME80SlBjd2xSOGpPWXozTVVOQTBJeVJEVTVYQktxTlBHCmhZNGlWUkNkd2g0Lzh2L3pldk9QUHR5U3NSR3pEMDdVaGdrODhZMVhub21wVGowOW5lNnExbjlRLzRqemtDQUYKWFB5TmtLb3EvcUJrM2lGcWRMN3pRcTJsa2V2dDlDa2s2b1lJdmJENDFqY1g5T2l4ZGw1bitvYUR6bEk0Z08wZQppemRlN3d1U3JpWFEvVlV0emVpQVM4dkVDZU1rUXNyUWpoSEtqMHhVTzQ4anhhN0FiYWsvRnE4Zy8zODNFSVlqCmlnWDM1Z2ZRV0d4Y3dJbVFIL1pwMnVrS01JWGZPOVlXOXVkQmlVQkljdTZTbWNoR2lBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:05:51Z" service.beta.openshift.io/expiry: "2028-04-16T20:05:51Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: d398e2a5-eba6-42f2-86e1-93535ab8f0b1 creationTimestamp: "2026-04-17T20:05:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"d398e2a5-eba6-42f2-86e1-93535ab8f0b1"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:05:52Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: d398e2a5-eba6-42f2-86e1-93535ab8f0b1 resourceVersion: "7768" uid: c0ea8a1b-b98c-442d-89ac-cabd9abfe43b type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:05:51Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 327d0912-6198-43da-b66c-eb5fd3ca8ebe service.beta.openshift.io/expiry: "2028-04-16T20:05:51Z" creationTimestamp: "2026-04-17T20:05:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"327d0912-6198-43da-b66c-eb5fd3ca8ebe"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:05:52Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 327d0912-6198-43da-b66c-eb5fd3ca8ebe resourceVersion: "7776" uid: 2b626d83-8e87-4ddc-a513-948c270b8aff type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T20:00:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"93667196-7bc3-4a89-b358-d8b5478a6003"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:00:05Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:00:06Z" name: operator-dockercfg-58vsf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 93667196-7bc3-4a89-b358-d8b5478a6003 resourceVersion: "3239" uid: c914db7d-e499-43f0-8a9b-9e5580eedc37 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27437"