--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:11:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fb776454-8a57-43ea-befa-d8d4952f2750"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:50Z" name: builder-dockercfg-sd6hk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: fb776454-8a57-43ea-befa-d8d4952f2750 resourceVersion: "4161" uid: 72bd2edb-1c49-4485-b455-599ed04b7a8b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:11:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9eaf8e4a-26ea-48a9-a420-23d0e1f30783"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:45Z" name: default-dockercfg-2fktg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 9eaf8e4a-26ea-48a9-a420-23d0e1f30783 resourceVersion: "3677" uid: 4279a22f-6b32-45d5-b44f-86c3fe9b428f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:11:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"298bcd5a-4568-447d-a962-f5e72fb16b7f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:50Z" name: deployer-dockercfg-jbhrf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 298bcd5a-4568-447d-a962-f5e72fb16b7f resourceVersion: "4160" uid: dc2f06ab-1d82-44a2-9cae-d9e6d985a920 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T20:11:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"183687dc-ce54-4f71-9c5f-7703c93c845b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:45Z" name: gather-dockercfg-qhnxf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 183687dc-ce54-4f71-9c5f-7703c93c845b resourceVersion: "3679" uid: 03344b6c-e3ee-4db0-bca5-1f6064deb547 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T20:11:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ebf81c10-a350-4fc0-8b81-c0f3f492c2e6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:45Z" name: insights-runtime-extractor-sa-dockercfg-59lxf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: ebf81c10-a350-4fc0-8b81-c0f3f492c2e6 resourceVersion: "3680" uid: 1dbf2166-0260-4a6d-924d-a1493ddd59e8 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:17:23Z" service.beta.openshift.io/expiry: "2028-04-16T20:17:23Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 918be9a8-6f51-4ca4-8a26-9bffd7bb728b creationTimestamp: "2026-04-17T20:17:24Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"918be9a8-6f51-4ca4-8a26-9bffd7bb728b"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:17:24Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 918be9a8-6f51-4ca4-8a26-9bffd7bb728b resourceVersion: "7795" uid: 43deeb74-0501-46e0-957f-a246e6fadecf type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJSGdmUUdXVmtIQWd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTFOekF5T1RBZQpGdzB5TmpBME1UY3lNREUzTVRaYUZ3MHlPREEwTVRZeU1ERTNNVGRhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQU1sbkhjdndPb3l2SGx0VTVyTk5VVUVPd25OTFl0WW91QWpIVm15c2wyVnhoWjh1ellkaApzbzBTRTFrUFBvUGpoVWxmaGdjRk9LRUdrdTBmUDNCZHZndVdxODFvVjFLN3pDbm5TZyt6TDd0WFFyRTk4NDNQCkZYU2ZmelNTd2F0Nm9KRFZ2dU5KRjhlQ01sS2ZpRExIcGljOUI0MHh2ZUpkMUlSa2pVRlNOQUtFVStVRWYyT3UKQUtLNkdTYUE1YTZleXZqenFkZVRmWFpVeEd6UXRaS3JuUFc0VENjbWJwNUc2a0JMTVpKWkZteEQ5eDZGbndSUgpjT2FLVmIvTFNhZktoTkVUYmVlZk1MWDBMbTZEL1pKL2dhUDlLdEJSQWNPOGt2NU01VXNuclI4aGw4K1dNQTFSCm1PY0pqd1ZiRTZkUzR5WEFEbmlPOStpSUMwRjRPeXVDUDVzQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJUb3VUcGZuTWFqdDE0NmtrRkUyeU5JNVNSUzdUQWZCZ05WSFNNRUdEQVdnQlFXS09qdEFlZ2NyVzUvCnM2cWVZbEZlRE5RVVVEQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkdOalpERXlOVEEwTFdRNU0ySXRORGd4TlMwNFptVmhMV0U0Ck5UZzRaamcxTVRjd1pEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFQMXhXSTUra1NQQUVQWHpLRm9BYVl6V0UKRStzVHE1UGxQQ3B6ZG5jOTcyL0Q3YVk3Y0xCd1BqV3FvaFRsc1pOQUlnbWVqdVpIY2QxZ1BvTFdJRHY2dzdabApMcjFEckxnMS9PUUJuSy9XRUpOa1JEQmEzNmxIZTQ0WHRqS1BtWkhicHBwaUVJVDlQYk1wcno3T3QwaDMwRUZKCmIzRWhzY1hLdWhHREQ4Q1BqR0dVUkI4R2N3dTQ2N01pbnQxWTNpYlB5MThJdmxtckwyaEhkSVJ0ODdoT1BablIKK2phQkFDUlFpZUJuUDEyZlN4ZDIvUzlJMERQMlcza3JvZFNBaE9wZ0srd01adjRpZTZobytJUU9RUzhaVVl0NApuOW5WTmRoSXJ5TFExY21LNHpWVXNVOVUwM25DK1NzS1J4bmM1UjZXaTBmMjlJUnc0SWRsMnh5QmthT05Xdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJQWlRbWRCZHc0UFV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUTFOekF5T1RBZQpGdzB5TmpBME1UY3lNREUzTURoYUZ3MHlPREEyTVRVeU1ERTNNRGxhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelkwTlRjd01qa3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzNFVVh0aThnQU5BVmE5WFpHcjdnV1RxaHMrYUlGaHlYaAp6VHFzaWpTY014Vld6KzlFSndCajlrMnN3cmJydERVSlAxbDROV0hrVFZjM2RVam9ESVY0UmVSSjJSbW44amthCjAzb29jQ01yZ0hkRWprRm9GTUxXYVY5c3k2MWptSSs3WnlBWjVpdlIyRGNGbUJ0cklSM1NKek1GOHYyYmZCZzYKb09IYnhrQXBGM2Nyd0NleFVOTVFybE1IdmZjSXFhRkRqckJFZ2FsdXgySWpCVWNMYWVibkJ5L2d5dVVLSHdxaApiRWlSNzRYS1VHTHpoeDBaSkp5YmkvYnplNnhlZExlSTZsYmFaUXl3N2w1WVlHNFJmKzYrcHNLdC9aUURVeWpiCm0rSGZQMWJXUnY5QUpKNFJZdDBnM1BaT2pXYzdER0NiQnBsUDBNZlhVaVk0OUlrajg2MUJBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlFXS09qdApBZWdjclc1L3M2cWVZbEZlRE5RVVVEQWZCZ05WSFNNRUdEQVdnQlFXS09qdEFlZ2NyVzUvczZxZVlsRmVETlFVClVEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFra2pWcjRFckNyZnFMRkplWEV1N1lDdXVwRVBKUjIrYS84ZlcKWW4rQVZEVVBXeXVTT29BNkZBUlI2aUFtNGM4MmVjbXR5MTV5U29MamtpNkFXUjBaNWVkNjluMHRwM0VBcEZCMgp0NHpPSG15WCtaMUQ1N3orbkczVFNaU1pWd2xGc1AzSkRzc0JubkFoUVE1dUNhZ2R5dmw4VG11VndPSFRlMWNhCkQyaGtkUHNXUTMyVEZSdzY0YlJRYWZXWE40N0t5bFNURWJjK3h6SzZUc3RzcjJIa3Q1QWlqN3NuUE5pSkZQajgKN1orV243M1paUTE1MTJvZXAxTlpqTGVJN1JzbmllWTdqQXA2ZU0vM0VWQzRUcm5mY1NKUGhST0VFSy9kazgxMQp2NkVmUkxsd2lsNDNITnNyOXdkZWxTYnErYmhFMUYyblVOVUNvS0FVK0xoclozVFg3Zz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:17:17Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: ccd12504-d93b-4815-8fea-a8588f85170d service.beta.openshift.io/expiry: "2028-04-16T20:17:17Z" creationTimestamp: "2026-04-17T20:17:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ccd12504-d93b-4815-8fea-a8588f85170d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:17:18Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: ccd12504-d93b-4815-8fea-a8588f85170d resourceVersion: "7700" uid: 7222f3ae-9546-4b71-9f55-aa1b62a8ba86 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T20:11:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:11:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"498f8508-70a1-4534-b200-b50da092d434"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:11:45Z" name: operator-dockercfg-x4662 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 498f8508-70a1-4534-b200-b50da092d434 resourceVersion: "3681" uid: fdd43a50-2ee8-449a-abb7-ae7b68740402 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26965"