--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T16:19:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"686aab2f-0701-49d2-afcd-d68a01351b7d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:45Z" name: builder-dockercfg-65v4q namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 686aab2f-0701-49d2-afcd-d68a01351b7d resourceVersion: "3829" uid: 8fb99e62-4c34-4911-a216-2761f4648aab type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T16:19:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7ad67de4-bf36-4212-a4ed-7ffc614526c0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:41Z" name: default-dockercfg-ng595 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 7ad67de4-bf36-4212-a4ed-7ffc614526c0 resourceVersion: "3215" uid: dfb6c25b-6850-48d8-96e0-9d49a839cd49 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T16:19:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"46e4796b-0686-4602-abbf-44292fe20e56"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:45Z" name: deployer-dockercfg-sgvbh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 46e4796b-0686-4602-abbf-44292fe20e56 resourceVersion: "3833" uid: 10ea27a8-0661-4df0-a756-db10a2be56ee type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-20T16:19:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5a2a0929-0829-4623-bab6-acab0b4f924c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:41Z" name: gather-dockercfg-fjb8h namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 5a2a0929-0829-4623-bab6-acab0b4f924c resourceVersion: "3233" uid: 8719eb97-b55f-4475-b5d4-c2bc1ec52c2d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-20T16:19:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"af436434-d6fe-4320-89de-af13d10badaf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:41Z" name: insights-runtime-extractor-sa-dockercfg-lgcvb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: af436434-d6fe-4320-89de-af13d10badaf resourceVersion: "3234" uid: f9a154e0-3188-4c8a-84dc-b1075af70944 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJVEVBeFpJcFk4Qll3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3dNak16T0RBZQpGdzB5TmpBME1qQXhOakkxTlROYUZ3MHlPREEwTVRreE5qSTFOVFJhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFOa0RvT0pmUUVJYjdkRUwyZ2QzN1piTkhBbUlvOW1STFRrbVMxamhPWE1qM2FuVQpSSkw5RlV3eDQyU3lhYWxraTQxRk0xNWJiUnVzbTF6UXlKK2UwYldRSWVHWjNQN1lsSG9lTGZpNUpjYWI5Sm16ClNZZXBmSWZUbWVPbjhPYUFKUUlsclFjQXlja01aNGNZSEZrRjFSVEpSQVhuM0Q2c3pybk1mNWNPR2pDVm1qL0gKUHk1WmpQUkFXQUlPQzZRbm5uOElwT2xwVkhPK0Z5TEFncHhkTVVnaVdCVkNzSUx2VUVWOXdEc1V1SVdTcmk3dwpabklJV1dmcFIrelpaYjAwNjlVcU43TDRBczFKL0JNS296TWIvRXg3UlVUN3krbmtQSFdpUVN0a1RwM2Y2YVUxClBZS1Fqa0ErVzJUd09waXJHNHlTVFoxWHpzR05sSzU3bjNhK2lJRUNBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCVHRkZVprVGZDYm9veTlWckEzRTdoMGFHWXpzakFmQmdOVkhTTUVHREFXZ0JTZllGZ29YTlIxClllZDZCNFZNck4yT055VVhOekNCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rWldOaE1qQXpPR1F0WWpBM01DMDBabUpoTFRrNE16Z3ROakkyWm1JMwpaalptT0dWbU1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQTdTeEJuNnN4QXd5STY1TzlGSmowYStsZjJrM2szClRmR1Z1ZUkvNkdYcCtCV2p0TEVlR2Jwb2lSWHR6Z1hzY0hhUnZIVW9oVFJiQkIxam9ucmVxYjJXdW5Ba2NwemwKZE0xcmV2RWIvSzgyU2cvMFhvbndKUGhsejU2R2V0VHN3WmpOYXduVjJlUjlLbHU2VGlPcnhXOUFKQUY0Y1BaWApMQWF4NGpkN3dVZWtVY2NDbUF6Q0dxWnFaMVh6akc0ZFBLaUh5dVU3YXR0TGhidDc4dG5TOUVPc01ZdU02bVpGCkN6QWtWVzNKeDg4MGpncGkvWituTUtaRlVoL2ViUC9aOFZWNEFHeFpXSUk2dmxFd20ySlN0QkpPZFo0QnF1UjYKdUQrNDg1UlB4Z2pFUGt4a3ZwRm8yTzhqeENzcUZQOElvL3EyeHBkNlJmeGJFK2JyVkdqVVFoQXoKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlVdVFobjlXSEZjb3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjd01qTXpPREFlCkZ3MHlOakEwTWpBeE5qSTFNemhhRncweU9EQTJNVGd4TmpJMU16bGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNNREl6TXpnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFERHJDMWxKSzhjeUYrZGNVOTBWc2dYK1pHTW5BUWt2MmF1CmR6WE4weHQ2UUxkTlhXaVRUcUREazZzVlQ5amtZZmNLMDIwUWFidGM4NjF3YXo5U3N4S2ordUhwTVNDUzZJWHQKWi9aenNxMmhld1lBd3M3ZDg3QU0zOXZKUFpRbnRLRnkwa1BxWVIzSnh2NGpZWUYrTXNNUlBueXhyQWJxMktZUQpuZXlOK0UxOHNrUHFUbHFsdnI0TGY3ZXVUVkZ3VVBoM21MTnhkajF5aXpIbS81RjJ3ZHM1SDVzNmpMQ3ViOTI2Cjc2K2QwbFRmZnB6UGlUd3Voc0VOVzJYTUNlL09UTEQzelBaMTFwR2IranFSaTJQSlJEclFGNnBYdFpZSFJYTWQKS3J0ZlUzKzJRMFQwNys0YUNKU054T2NrZzdzTFV2dVpSc01MVUNIaU1IWkJkb1A3NGwvUEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCU2ZZRmdvClhOUjFZZWQ2QjRWTXJOMk9OeVVYTnpBZkJnTlZIU01FR0RBV2dCU2ZZRmdvWE5SMVllZDZCNFZNck4yT055VVgKTnpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVFTTzU4Q1diei96QVVmbUk0MVlQT04vMFlyeGlRSTljNUVRQQp0NGxXdlBkNlFiSm50RnJMdXZrOUkwRG5sbTAwUzBmVUowRHVKTnFGTmNiYnFoTnpTcDg1QVhJRzIzdkFtcnVkCjFjcVl5VVlLcEN2RTVTaDFQYXM1dUdxZ3kxa3gzNVRnNUdDaGJsTHVDelJxUVRBNWlkY1dKT29PUEJQUFZVazIKKzFCN1lGM1BmRkJxaFRIU21iOC9pUE0yU25xa0NoQWlTMXV2dFRrakVCUEZiSnZqZW9QNzlrQkZBUEN4OS9kUgpQeTZ3M2t0V0NDMFFURUJFaDY2TE80ME9jNjFFTm4wZHQ3cC84WHNGc29FSGU4WEgwOWkvNXhKc0ZRRHUxeW1mCkdFekhLM2RSZTVHaXVpSW1UZ2VOU0h4OTVjTUlsU3RFZ3hsV3U1M0wra0ZubnU0dmZBPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T16:25:54Z" service.beta.openshift.io/expiry: "2028-04-19T16:25:54Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: eca2038d-b070-4fba-9838-626fb7f6f8ef creationTimestamp: "2026-04-20T16:25:55Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"eca2038d-b070-4fba-9838-626fb7f6f8ef"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T16:25:55Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: eca2038d-b070-4fba-9838-626fb7f6f8ef resourceVersion: "8017" uid: 1cc7d7aa-edd4-453f-beb1-7dd7c785846e type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJUXozY3VQcm5jMDB3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3dNak16T0RBZQpGdzB5TmpBME1qQXhOakkxTkRkYUZ3MHlPREEwTVRreE5qSTFORGhhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQUtyaVpPMURaU2ZJeEdPYnl1TmV2NHVMSUUvSjhNYkVyWXAxUkcwNWRxQmhQS0dkb0JGdgp3MzZaeTJoL0ZLc1JmZnJvcEsyQU13SlAwV3lwN1kvTDFQMTFRaVlmYXZkc2pHbUZ5NldqL2xaZnJ6UlBiMlFnCml4QnJHWklKMmtoeHppM25HQmJncmdzZTl5TW1PQW1Jb3VFc2VadnF1anJXbU9EQklWeXpOVUR2SVg2NTBPQlIKQ1VzNTRaSUVKeU4vVithYStYbWpWcEl5TU1QKzc5SVZCU2hyRXNIK2xnOGl3dnhVSno5OVZWK0RaN2wzeHJUKwoxcmYreDAyMktXWXRWYkU5UE44S3AxSDRxME0vNm9yVjVRdkEvbGZjZDlaQTZOTU9LSTJPSlE2dmRPdXVRWXFTClVwL0ZJYnhrT0dCRmFwdHVEQXN3bEdDSGtjY1hCR0FyMDhNQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJTQUJkeDJjR1ZyaHZvR2daVzVJYm4xdGxsa2FUQWZCZ05WSFNNRUdEQVdnQlNmWUZnb1hOUjFZZWQ2CkI0Vk1yTjJPTnlVWE56QlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkRCa00yRm1OREk0TFRaak1EWXROR1ZqTkMwNE9EQXpMV1F6CllUUTFaRGN4WVRNeFlUQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFlaC9sUDBmMkhUWFRYNHNMSGlpQjRkNWwKOUxwaGlxMS9EZkRGbkpwMVQ1OG5uSmtPb3JEY2tYc1NIbFdZS0pueS9UVkFLeDh3cUprN0Y4V3I2WHM5UEJ0ZApUbDVIa21UaVJuY3hzR2ppM2k5L2ZZNDV1NlhlSmJSUXNoMWlsVldiQWhXa0l1THR1WW0rUUZLQVVzNm8yZ3hGCm16YldKLzdmb2Q4dEpEM0dIWFduYStiVnF0WUpnUDNaWlBvTHRxRW92VGxPMjZWbnIyNEFOWjR2cFgvcTN1dzgKcER0Tng1ZXlqc3JVUVVEUHVEWGpzb1hPYTExQS84SUNrVldqTjNTSHVFOVFWWWtCa3RLOXpRZFA0b0FESFpNWApXNnl3a1NMckU2cWRaQ2lCb1lMMHRWenoxLy9qR1VROXlKNDVjSHAxYTFSc2Q1SWlpYThJakpzdzBNS0Erdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJVXVRaG45V0hGY293RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3dNak16T0RBZQpGdzB5TmpBME1qQXhOakkxTXpoYUZ3MHlPREEyTVRneE5qSTFNemxhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelkzTURJek16Z3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRERyQzFsSks4Y3lGK2RjVTkwVnNnWCtaR01uQVFrdjJhdQpkelhOMHh0NlFMZE5YV2lUVHFERGs2c1ZUOWprWWZjSzAyMFFhYnRjODYxd2F6OVNzeEtqK3VIcE1TQ1M2SVh0ClovWnpzcTJoZXdZQXdzN2Q4N0FNMzl2SlBaUW50S0Z5MGtQcVlSM0p4djRqWVlGK01zTVJQbnl4ckFicTJLWVEKbmV5TitFMThza1BxVGxxbHZyNExmN2V1VFZGd1VQaDNtTE54ZGoxeWl6SG0vNUYyd2RzNUg1czZqTEN1YjkyNgo3NitkMGxUZmZwelBpVHd1aHNFTlcyWE1DZS9PVExEM3pQWjExcEdiK2pxUmkyUEpSRHJRRjZwWHRaWUhSWE1kCktydGZVMysyUTBUMDcrNGFDSlNOeE9ja2c3c0xVdnVaUnNNTFVDSGlNSFpCZG9QNzRsL1BBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlNmWUZnbwpYTlIxWWVkNkI0Vk1yTjJPTnlVWE56QWZCZ05WSFNNRUdEQVdnQlNmWUZnb1hOUjFZZWQ2QjRWTXJOMk9OeVVYCk56QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFRU081OENXYnovekFVZm1JNDFZUE9OLzBZcnhpUUk5YzVFUUEKdDRsV3ZQZDZRYkpudEZyTHV2azlJMERubG0wMFMwZlVKMER1Sk5xRk5jYmJxaE56U3A4NUFYSUcyM3ZBbXJ1ZAoxY3FZeVVZS3BDdkU1U2gxUGFzNXVHcWd5MWt4MzVUZzVHQ2hibEx1Q3pScVFUQTVpZGNXSk9vT1BCUFBWVWsyCisxQjdZRjNQZkZCcWhUSFNtYjgvaVBNMlNucWtDaEFpUzF1dnRUa2pFQlBGYkp2amVvUDc5a0JGQVBDeDkvZFIKUHk2dzNrdFdDQzBRVEVCRWg2NkxPNDBPYzYxRU5uMGR0N3AvOFhzRnNvRUhlOFhIMDlpLzV4SnNGUUR1MXltZgpHRXpISzNkUmU1R2l1aUltVGdlTlNIeDk1Y01JbFN0RWd4bFd1NTNMK2tGbm51NHZmQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T16:25:48Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 0d3af428-6c06-4ec4-8803-d3a45d71a31a service.beta.openshift.io/expiry: "2028-04-19T16:25:48Z" creationTimestamp: "2026-04-20T16:25:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0d3af428-6c06-4ec4-8803-d3a45d71a31a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T16:25:49Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 0d3af428-6c06-4ec4-8803-d3a45d71a31a resourceVersion: "7903" uid: 36226c78-fd1b-4bd2-b6b2-c720fb9053d8 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-20T16:19:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7577aba5-5f85-4dba-afa3-f53851413403"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T16:19:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T16:19:41Z" name: operator-dockercfg-88kd2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 7577aba5-5f85-4dba-afa3-f53851413403 resourceVersion: "3235" uid: 1d35e510-ed75-48ba-9a80-e01b6afca27a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "28010"