--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T17:22:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7faacce8-fede-42f7-9bcd-7837702526ee"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:26Z" name: builder-dockercfg-b6qs7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7faacce8-fede-42f7-9bcd-7837702526ee resourceVersion: "43300" uid: da97d22d-6735-476a-bf3b-6b1b61b87aa0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T17:22:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ec8cf720-7d51-47fa-9d2e-10f8e9ebd5ed"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:24Z" name: default-dockercfg-mzmhl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: ec8cf720-7d51-47fa-9d2e-10f8e9ebd5ed resourceVersion: "43063" uid: 6c5dc5c8-35ea-420f-ac23-7565309da097 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T17:22:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a3147b7c-83bc-40c3-ae74-de69bb8f4703"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:54Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:26Z" name: deployer-dockercfg-r7kd7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a3147b7c-83bc-40c3-ae74-de69bb8f4703 resourceVersion: "43336" uid: a11ec095-ba24-4627-926e-95ef514fb294 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T17:22:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e34ab7c1-3830-433d-94c5-e3b776d6865b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:24Z" name: gather-dockercfg-sd7mv namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: e34ab7c1-3830-433d-94c5-e3b776d6865b resourceVersion: "43048" uid: 4e1226ed-075f-4836-a827-3aab0b0feddf type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T17:22:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1a8a64b1-9243-41b8-8b73-d24e2a72598f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:24Z" name: insights-runtime-extractor-sa-dockercfg-jslpj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 1a8a64b1-9243-41b8-8b73-d24e2a72598f resourceVersion: "43103" uid: ab4cabd9-0d89-463f-9602-771e93dafb36 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:28:47Z" service.beta.openshift.io/expiry: "2028-04-16T17:28:47Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: e8445286-b19d-4fac-a332-aa3db19cb0e2 creationTimestamp: "2026-04-17T17:28:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"e8445286-b19d-4fac-a332-aa3db19cb0e2"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:28:48Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: e8445286-b19d-4fac-a332-aa3db19cb0e2 resourceVersion: "7804" uid: ff6ee26f-00a4-4f18-b9c9-7b51e39aff1e type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T17:28:41Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: c9e329c1-e3f6-48a4-8a50-2f8c6c449f52 service.beta.openshift.io/expiry: "2028-04-16T17:28:41Z" creationTimestamp: "2026-04-17T17:28:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"c9e329c1-e3f6-48a4-8a50-2f8c6c449f52"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T17:28:42Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: c9e329c1-e3f6-48a4-8a50-2f8c6c449f52 resourceVersion: "7685" uid: 7574ff05-a82e-4f37-9576-452e64e51882 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T17:22:50Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c1abbe82-4c72-4947-b707-8be25484286c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T17:22:50Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T17:59:24Z" name: operator-dockercfg-wdtl5 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: c1abbe82-4c72-4947-b707-8be25484286c resourceVersion: "43179" uid: 17d697d4-5813-40cc-8314-7314bc45d4cc type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "45954"