--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T19:17:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c0a7680f-de73-49df-a075-58a1db58aaf9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:14Z" name: builder-dockercfg-k2br8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c0a7680f-de73-49df-a075-58a1db58aaf9 resourceVersion: "42750" uid: 57fb94a1-fa3a-4cfb-9a3f-ddd03d24cbf7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T19:17:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3e20014d-9c9d-4242-82f4-8da992007c30"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:10Z" name: default-dockercfg-kjtv5 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 3e20014d-9c9d-4242-82f4-8da992007c30 resourceVersion: "42562" uid: 216d1166-94ae-4d7e-84a0-7d57ba8385c3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T19:17:14Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d6382768-8b22-4fe9-83bb-d1e4e0974f9e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:14Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:14Z" name: deployer-dockercfg-wrsc5 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: d6382768-8b22-4fe9-83bb-d1e4e0974f9e resourceVersion: "42760" uid: 7c664bf6-f178-44a0-9e1d-ddfe36fb3774 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-20T19:17:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"46ca2072-7f91-48bf-abd8-13d19fc4839b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:10Z" name: gather-dockercfg-s4hpv namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 46ca2072-7f91-48bf-abd8-13d19fc4839b resourceVersion: "42568" uid: c479bd96-7086-45d4-849b-7b5cec3c0f17 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-20T19:17:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1a01b300-7281-4393-8d75-185b3e9249f0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:10Z" name: insights-runtime-extractor-sa-dockercfg-d2rzs namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 1a01b300-7281-4393-8d75-185b3e9249f0 resourceVersion: "42581" uid: b7b00c50-78eb-4e61-850a-542071bf298a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJSEIrUGJsejAwM3N3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3hNamszT0RBZQpGdzB5TmpBME1qQXhPVEl6TURWYUZ3MHlPREEwTVRreE9USXpNRFphTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFLaHRLS2liZ2cxSzBwWXM4ZHYxNXpvWmllV3B5ZkR4WWd2MXMvU28wcnQ1MzNuNAo4c1RLSGZBbW5BNlkxQWRLTmFrZG0rVkJpenNCV2Y1ZjR0bmQzSHEvVWluU0wwK05oZE4zNWQ4eEdzZUxpLzI2Cmk1b1oxNDBKOHVkeTh5bXAvZjUzUDFNT3NLNHNIdGlMZEQ3Q3pDd3NPM25pek9nNHdTSnNISjVmdHdnWmxnM3cKOVV5dlhHd2ptcEduOWNQVDQzREF1UkdwVndYc2Q3Zm5BdDRYSHdtRElHQlMrVEJaZGdtUUcrc2E0T2NlMkdvTQpXazllaEtXNHhWWFBpdXBiOFMvUHpRcFUxTUxWSFNuemdQbncyaVV3VlVPRjFUWml6ODArV0tINk1JRUtNK2hvCkhQTm1XT3NYQy81TEVsaHN2UWptOGM0MytyN0xqNkpNQmhrSW5Bc0NBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCUXN0UEVLYmpjbDNHVUlpYTJQeUF0TExDRDRiekFmQmdOVkhTTUVHREFXZ0JSS3VLajBCbGt3Clg4ZzN4Zmw5cXBKYnJ4R1RGakNCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rTnpVMU5XWXdZelF0TWpNM05pMDBZVFU1TFRobE16TXROVGN6WlRaawpaR00xWmpBNU1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRRExNYVUrMldXeGgrUzhGejVJaE1xc2FjaE03ZGJlCnN4NnFqS2d3SnI5UEQyMnc0REo2d0gxZHV6Q0hrSnk2R3JWSk5YU0JZUUdwdm1XNzZXYTJQSW9oME02UTdmTEsKZHZaQk1aQ3RVcXFhUDMzbFJqWXJaenQ1cmk4L2xzc1MvblpzL0pvcVBMb1NDOXZTd2k3NUFDVEwvVUh2STlmYgppcFJBUzBkRGkxUldCaHh2SWZwYlkvb1d4SEFjdkdCOEtqUlZoWEtycFFWYU9ybytwRllqcmRPcFBEU2w0cXpKCmEzSExsYlROV1VZVzFHOU8xdlFteXRmSU9LZExGajJaRGcyMmRINzdrcUdMNTlkZCtESkhGdHlvVHcrZkFydDYKNHN6TGhRL3ZRR1lwOWcwNFVmd2ViUEF6dGpEb1V5Q000UEpQOURnanRxZnBNQmJmaitpaHZIL28KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlZT09DaHNSa3JPUXdEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjeE1qazNPREFlCkZ3MHlOakEwTWpBeE9USXlOVGRhRncweU9EQTJNVGd4T1RJeU5UaGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNNVEk1Tnpnd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEUlpMQzhoN0I3YkFOaVNjZTY1NmdVQ210bStIT0xCQXVvCjc5a3VGMmtJWnVoZFNWTzBRVm9LOFVlRG5RZklkSUx4NG9FZUVpYVlUNlR3VlgwN0tPenRvakFUWXBTZnBPeHcKd1crV3pSbGhmYXNRcDZUL2JQMDh2dHhhWkc3NXBreDJBRU9maWZReXdQekVBRmVZRkFlN21lTnhkcnEwNWlydgozOTd4N1lpMDV4OStmOEVNVURhbjZhbjMyQ0IvcmJ4aktQVzlkVElSYzJKUUV1VCtsK3RyUTdFYjZIaXpSY2RNCmVPcjZ5akltUTB5dzFQazRJU29zNUUzVTBCekd1QlMxc0gxODNDTVNtcmJwN0IzZWE2K1BVN0Z2Yk0vNDlWRisKREw1amdpK1F5bS9nblEzYlBmdW83ZWZxdk1PTElwVzNqVTZUb1pXbU9LVTQ1bXRkYVJUSEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUkt1S2owCkJsa3dYOGczeGZsOXFwSmJyeEdURmpBZkJnTlZIU01FR0RBV2dCUkt1S2owQmxrd1g4ZzN4Zmw5cXBKYnJ4R1QKRmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUJHSEFzb2V5MWNRZGlxeExOa3VXVU1LN1VKOXRkMFdTaHhTagpDVmpSUk4rNEFQQjBmRzdBcmtRN3A5Nm9FbGJyVG5EdVM2b3N3TEFGRjNFMUpZTGlEejR0YVdwdzFWemJnZlRTCm94Zk1QMnhBYTRXRWhKTlVMeStPcGFrRHd1UmQ5YmhnelhlNUg0bTFTL054VStaTmc1R3kvNXFkZTg4UDRDVUwKTGVrSHE5b2gwRjV3YVhNeTVmYitDQ2F1R2xncTFhZVJ4cE85ZllnYzZHU2pnM1B1REhURE9zbXVPeExQYjJNTApUUVN5eHl0U3dkOTVnTUlYK1NMbXZQejg3WmZab2VFV0xWZHM4QkpJSlR4TVR2N0RwcXZOOVJidUtsSndhaEc5Cmw5TlVwdjdGZUkvQ0YybG93SU1aT0RSMHV2WW40ZGovbXA0MTRUMm80eDBPdU90MmRRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T19:23:06Z" service.beta.openshift.io/expiry: "2028-04-19T19:23:06Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 7555f0c4-2376-4a59-8e33-573e6ddc5f09 creationTimestamp: "2026-04-20T19:23:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"7555f0c4-2376-4a59-8e33-573e6ddc5f09"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T19:23:07Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 7555f0c4-2376-4a59-8e33-573e6ddc5f09 resourceVersion: "7721" uid: f70a316d-5b80-40ed-be38-559f58b4cca9 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T19:23:07Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: cd2b73b8-163d-4406-a9c6-0e0ddff4d464 service.beta.openshift.io/expiry: "2028-04-19T19:23:07Z" creationTimestamp: "2026-04-20T19:23:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"cd2b73b8-163d-4406-a9c6-0e0ddff4d464"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T19:23:08Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: cd2b73b8-163d-4406-a9c6-0e0ddff4d464 resourceVersion: "7736" uid: aef2d2e2-ae33-4f13-a954-01850c99cbf1 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-20T19:17:10Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e4fb8995-a4ff-48c2-9139-aed44a77aeb6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T19:17:10Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T19:53:10Z" name: operator-dockercfg-gpbmz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: e4fb8995-a4ff-48c2-9139-aed44a77aeb6 resourceVersion: "42566" uid: cc18c62c-af41-4411-b7eb-3f49522e13bb type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47201"