--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T14:31:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"31231e36-6b24-465e-b4b2-a5682cc93afe"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:06Z" name: builder-dockercfg-94tfb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 31231e36-6b24-465e-b4b2-a5682cc93afe resourceVersion: "4115" uid: 9282dde9-6ab9-47f5-a0ee-610e4aeef994 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T14:31:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b09a318a-d0dd-43bb-846a-079c291b7331"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:02Z" name: default-dockercfg-pgdcj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b09a318a-d0dd-43bb-846a-079c291b7331 resourceVersion: "3632" uid: e7666f3e-8c2a-44b1-8879-6c5d8c3423ec type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T14:31:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"be66c388-9abf-447a-9f00-8de027e7add2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:06Z" name: deployer-dockercfg-bbmf5 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: be66c388-9abf-447a-9f00-8de027e7add2 resourceVersion: "4114" uid: c1600950-c227-4b02-9c83-1a085f3a64e4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T14:31:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6d582ef8-1012-4821-a30b-ea5015d07273"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:02Z" name: gather-dockercfg-gcrx7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 6d582ef8-1012-4821-a30b-ea5015d07273 resourceVersion: "3635" uid: e424b2df-3a31-496d-b381-674972952ba6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T14:31:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"327568eb-8c78-4d08-a3b5-e9ece15ec8dc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:02Z" name: insights-runtime-extractor-sa-dockercfg-qsgzg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 327568eb-8c78-4d08-a3b5-e9ece15ec8dc resourceVersion: "3637" uid: 18f2e3e9-1ff8-47e4-89cd-12b241dd74aa type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJVXYvSU5EcE5CdDh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXpOalU0TWpBZQpGdzB5TmpBME1UY3hORE0yTXpaYUZ3MHlPREEwTVRZeE5ETTJNemRhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFMcUtTZzV4em5aMUdTNEhwOUZveFNzTVhLOW9IVnBUS29zdUZJQW92cFcwbTBDaQp2NHJrUDBnWUNqeHZreDducUE1RkFFMVJyS2YrSVdxVFpZSnAzR21KR0UzaXgwUnllK0czZFRWTTZhb0h0NkdvCmZQdzNNdzVZZFIyMTVhbnRHTnJHVEtKSU5SSUNoUWdydzlwdlZka2ttL3l6d3MwS3d5VEdjNzdmeng1QW9PQlEKUXUxOFdUaWJ0Rmt0M3BDaUp3UGVXaFRGNzVsdnhqdjM1RnJhTjBQdE82WndEYUhLM1c4VHJ1ZGpuNUhTdEUrSgpmMTRzL2U5TWw4UWRuN3dpWnV5b3pUbGp2QXFucWZtby9RbEZ0UnRvVWVGSnZWUGx1K2tQQVlIMVVaeURRMFZYClM5cTdzaUpGZ1RrZHNnN2hmNWQ2K0VPampjZmxmNkNvZDNkak92Y0NBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCVDc2RmtOdG1nZENSVFpKdzVFQ1lIeXoyWTRVREFmQmdOVkhTTUVHREFXZ0JUYkJMbEVxenVRCnUvN2puRGU5NE9YeUNGdFhNakNCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rWm1Rd1ptUTFZbVF0WXpnMU1TMDBNbVprTFdJeE5EZ3RZams0TmpWawpZV1E1WWpGa01BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQS9SQ1g1Wmx0amlnblFXc0w2QkxzTFJaTVQvaGhxClp3MWYxU29iK0dLSHNGRFlPamJaUFBKOHlJZ0hZUUhBdVIzbkJUcEh3T051RjlUSHdXTDR1YzZYQzV5VWdiSUgKaTlaUUlWcDY4em52dG9uMnNuT016QWMwNmNwaDRKR0gwdnVKejRtN0prL1RBRHBPSWdCRi9UWGViallEZkM2cApVYkgvNXpFWkNWR09rV1lteGt2bHFUT1djWkdMZ1BmaUJNTjFSd1MxNVA0OXczcVBFVnFnbmllZGxjTTVkRFN0Cm1rcnRYR0VYNytLZ2FyQ3RmYzVKRFY4bTBwZVNXNTNteUFWQitYYTZFbnBJTmxGZURyMEtXUTJKOXJIOS9NcngKRkltaWRFREUzVXkxb3pYME0wMi9nWGdCNTRzYzExNk1MalRaVnNFcFNESC9UZ2RLRnZIbHFvWVUKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlTZlZ1L05la090QXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRek5qVTRNakFlCkZ3MHlOakEwTVRjeE5ETTJNakZhRncweU9EQTJNVFV4TkRNMk1qSmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBNelkxT0RJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDcjVCM25NcEM2c3RVbnhjSlpwVUo2NlZVck5DWWI2cDJoCkthVHgralg4SWd2RDZEY3pTVERKZDlGcG1VOTRFSE15Sk8rOHNySE9LRnBaU1hyRXE0RWZSaVlKQ0FMYkdsVjIKVHlERnAzN0FzVm90VmNpdG94TDV2QkQzNHN5Tkh3dXdXcllsM2lhY2QzUlNRRmZic3Z4Vk5IRVYxVHNaVDRkOApRNjZBdlE3ZVpjSStsQW5jNUFFVCtzU05NWHJVV1dKUG44Mk9KOWJLd2NKMVJYdHUvMkM1SnRsa2JZS2lEVlpOCkVrT2RxZEpmRFNHa3VZRVp5Nm04SU12azQ3MjVmdE9jRWdsaVdCUERqRG5xa3dBcjBXejF1RzI5VE1nR1NqUXgKQ2xDZ1ZSZ1NFM2RHRnA4SjBBQnJiMDE1V3BLbllTci9EWndIYk5YaWNJdGM4eGNxTFpKRkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVGJCTGxFCnF6dVF1LzdqbkRlOTRPWHlDRnRYTWpBZkJnTlZIU01FR0RBV2dCVGJCTGxFcXp1UXUvN2puRGU5NE9YeUNGdFgKTWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUdDSkM5RFZaS2N2d29GeGRLeXYrbVNLYUdENjQyZjNDZ0JhcwpNMTMyTkJJeXcxamppN2FTY0ZQalM5M3BLRnkwR0lYV1NMZ2p5cG5kaUlSRVhyczJqangzY3pqNGxWQVR3d0VSCmpKVFdNY3d2SEJmU1cwZWorUEZOOFRhZ1loL2FjcHE4bE5JQm9ud3FUKzkydWgxeHRPMWQxakgzNzRJNHZCQXcKYWhkVTE5Um14L0xwbHFTWHl1alZiR0piQml6UlRxRFI1QU41SDVoSDkvUlZlREJBM2xSemlwZXMzR1lhU2ZZQwozcmZueXZXMThUSldtS3NQa3N4T1hYZVNWQTcxUGlqQVN3VlhBQm1QVDIwT2UwY1NVa05KWE5rMmlOeDNQYzFCClBRZnNuVEg4NUNGK3FyUmdiWE9FWmVPcmZ1a3BGeHlUNnF5a2JTc1lrR29Bb3hYQ0lnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:36:37Z" service.beta.openshift.io/expiry: "2028-04-16T14:36:37Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: fd0fd5bd-c851-42fd-b148-b9865dad9b1d creationTimestamp: "2026-04-17T14:36:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"fd0fd5bd-c851-42fd-b148-b9865dad9b1d"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:36:38Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: fd0fd5bd-c851-42fd-b148-b9865dad9b1d resourceVersion: "7864" uid: b01e5721-d6eb-4a56-90f0-de4d363ff76c type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJRGRKdFNWNW5rMEV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXpOalU0TWpBZQpGdzB5TmpBME1UY3hORE0yTXpCYUZ3MHlPREEwTVRZeE5ETTJNekZhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQUxCZVU3djh4OHZ3dk5iQVhYalQ5TjN3elJKYlJzeGlsMzRTa2MzQmMzYnNMbHpXNlZybwo2R2ZnQjhLbWkwK2tzNDRlNm9URVFNU3pyOE9Ud1YxUWJxWWtKNVdWTWhCQ01IUGN4U0NtSDMveDVzZDFBVWl1CnlISE9Ra1Y2NWhqTVVNRTJVRm9iOWtPVDV0bkM4RVRwRTV6ajJXUG4rN0trZ1ZsalhxeUk1VlVWd0FhMlk5R1MKaW9UQk9OUzBMdmw4bzMwdHRkRnVEYTdWcmx4WUJSbXpscExKUFF5Yy96QTNPSm95T1ZVSDl2bGMvMCtNdFh6SApkUTdWbm42Mmw3dVFYV3p2Smx1cVNHVllkY0Zhc3UxNUFzTjgvNFU4QlRwT1RubEt2WUs1bm83eGdEa2szOC9WCmdWUnQ1VWR4MUFReWVrcndxa2Zhd25oMnJFUFVueHhsZHM4Q0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJSdmN0WG5IdUN1aEhBSmJ3Um1nQjFrRVlnZk9qQWZCZ05WSFNNRUdEQVdnQlRiQkxsRXF6dVF1LzdqCm5EZTk0T1h5Q0Z0WE1qQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkRGaFpUVmxOMll4TFRnell6RXROR1V6TXkxaE1EWXhMVEJoCk5XVmpObUV3T1RGaFpEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFMNHBmNmJYcjl3VkRibFY3UmZpc0VMR0kKdHZYNGxNRU9PNTN4a2gvNnZOVzVKb2tVcXlhbjVvWmZGWEc1cnFjTnFvZWpRQmdnWmV1QTVHa2JJOHZJOE1wdwp3WUhyek5pcFlrRUF2YVhObmNmY0lDaFhObkNEN1JQZklhRzY3ai92MGVOS3hpNGtvY0JPRk5LNlFWekZIbDY5ClRScUtlUURmZ0h5emUzeVg0RnZ4SGhRYXY2clhqTmZxaEIwS2ZLV3VmZHdMMG1hWkRieWVKazZtS1pSNmFMZXUKQTZQdWFnVENOUzRreXBJOW1Gb05FcytmalpwS3J4eHYrWm1BSUFWRnUwdmJXeW9QdGpzRjdVN29TVXZpbkthWApRTC9LeGEreitVK0pYQlpCTkFyY1FmZ3ltdFFIaFZlZVpaOSt0R0dhdnV0azRQK0k2SnNMTmU3dFdKRERDZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJU2ZWdS9OZWtPdEF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXpOalU0TWpBZQpGdzB5TmpBME1UY3hORE0yTWpGYUZ3MHlPREEyTVRVeE5ETTJNakphTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelkwTXpZMU9ESXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ3I1QjNuTXBDNnN0VW54Y0pacFVKNjZWVXJOQ1liNnAyaApLYVR4K2pYOElndkQ2RGN6U1RESmQ5RnBtVTk0RUhNeUpPKzhzckhPS0ZwWlNYckVxNEVmUmlZSkNBTGJHbFYyClR5REZwMzdBc1ZvdFZjaXRveEw1dkJEMzRzeU5Id3V3V3JZbDNpYWNkM1JTUUZmYnN2eFZOSEVWMVRzWlQ0ZDgKUTY2QXZRN2VaY0krbEFuYzVBRVQrc1NOTVhyVVdXSlBuODJPSjliS3djSjFSWHR1LzJDNUp0bGtiWUtpRFZaTgpFa09kcWRKZkRTR2t1WUVaeTZtOElNdms0NzI1ZnRPY0VnbGlXQlBEakRucWt3QXIwV3oxdUcyOVRNZ0dTalF4CkNsQ2dWUmdTRTNkR0ZwOEowQUJyYjAxNVdwS25ZU3IvRFp3SGJOWGljSXRjOHhjcUxaSkZBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlRiQkxsRQpxenVRdS83am5EZTk0T1h5Q0Z0WE1qQWZCZ05WSFNNRUdEQVdnQlRiQkxsRXF6dVF1LzdqbkRlOTRPWHlDRnRYCk1qQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFHQ0pDOURWWktjdndvRnhkS3l2K21TS2FHRDY0MmYzQ2dCYXMKTTEzMk5CSXl3MWpqaTdhU2NGUGpTOTNwS0Z5MEdJWFdTTGdqeXBuZGlJUkVYcnMyamp4M2N6ajRsVkFUd3dFUgpqSlRXTWN3dkhCZlNXMGVqK1BGTjhUYWdZaC9hY3BxOGxOSUJvbndxVCs5MnVoMXh0TzFkMWpIMzc0STR2QkF3CmFoZFUxOVJteC9McGxxU1h5dWpWYkdKYkJpelJUcURSNUFONUg1aEg5L1JWZURCQTNsUnppcGVzM0dZYVNmWUMKM3Jmbnl2VzE4VEpXbUtzUGtzeE9YWGVTVkE3MVBpakFTd1ZYQUJtUFQyME9lMGNTVWtOSlhOazJpTngzUGMxQgpQUWZzblRIODVDRitxclJnYlhPRVplT3JmdWtwRnh5VDZxeWtiU3NZa0dvQW94WENJZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:36:31Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 1ae5e7f1-83c1-4e33-a061-0a5ec6a091ad service.beta.openshift.io/expiry: "2028-04-16T14:36:31Z" creationTimestamp: "2026-04-17T14:36:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"1ae5e7f1-83c1-4e33-a061-0a5ec6a091ad"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:36:32Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 1ae5e7f1-83c1-4e33-a061-0a5ec6a091ad resourceVersion: "7719" uid: 142642a0-8246-477a-b4c0-f50789ddc7db type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T14:31:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ddcd51d4-132f-43ed-ad3c-2979ec86e747"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:31:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:31:02Z" name: operator-dockercfg-mfjbl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: ddcd51d4-132f-43ed-ad3c-2979ec86e747 resourceVersion: "3638" uid: 53300486-f72c-4610-b1cf-5638f1dfae76 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27666"