--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T16:16:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f652f424-aa86-4104-b428-6fd5942a8597"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:08Z" name: builder-dockercfg-nsgpz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: f652f424-aa86-4104-b428-6fd5942a8597 resourceVersion: "3687" uid: 9ecfec99-78d3-4406-a3e4-eb42cda91602 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T16:16:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6824a8fc-05a3-4e9e-8504-38ef139cfc4f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:03Z" name: default-dockercfg-9zbnf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 6824a8fc-05a3-4e9e-8504-38ef139cfc4f resourceVersion: "3068" uid: 788d8e08-6e27-4f3d-ba96-aba8427b0967 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T16:16:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"64e52377-de87-49f2-8432-ddd04625883a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:08Z" name: deployer-dockercfg-trhb4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 64e52377-de87-49f2-8432-ddd04625883a resourceVersion: "3701" uid: 1718c0b5-34ee-40ae-87fc-b5eb4c2d819b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T16:16:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"198f84fb-47a0-4b84-b9e6-47548818bbd0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:03Z" name: gather-dockercfg-8f8c9 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 198f84fb-47a0-4b84-b9e6-47548818bbd0 resourceVersion: "3070" uid: d0d3755e-a590-4ed1-85f3-ef3c7e99b193 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T16:16:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f45b637-692c-4e63-aefa-e0115ff70df6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:03Z" name: insights-runtime-extractor-sa-dockercfg-8zcsn namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 7f45b637-692c-4e63-aefa-e0115ff70df6 resourceVersion: "3073" uid: 6b6a00c7-b0bf-43fc-9302-aec6f743d0aa type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:21:53Z" service.beta.openshift.io/expiry: "2028-04-16T16:21:53Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: e962218e-2766-4929-899b-aa8ce2a4b0fa creationTimestamp: "2026-04-17T16:21:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e962218e-2766-4929-899b-aa8ce2a4b0fa"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:21:54Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: e962218e-2766-4929-899b-aa8ce2a4b0fa resourceVersion: "7703" uid: 0b50cfb4-9178-44fe-a0a9-ab589ad62adf type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T16:21:53Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 866b372c-a102-4419-a00c-bd79ef2c8583 service.beta.openshift.io/expiry: "2028-04-16T16:21:53Z" creationTimestamp: "2026-04-17T16:21:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"866b372c-a102-4419-a00c-bd79ef2c8583"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T16:21:53Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 866b372c-a102-4419-a00c-bd79ef2c8583 resourceVersion: "7684" uid: 37333982-f7ca-4979-a6a5-fd3dda58badb type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T16:16:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T16:16:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"dfd4520b-35ac-4796-8a76-2f4332015b89"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T16:16:03Z" name: operator-dockercfg-7m68n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: dfd4520b-35ac-4796-8a76-2f4332015b89 resourceVersion: "3075" uid: 0b768f29-5c7b-4174-918d-1c7da3512c37 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "41440"