--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T16:18:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1607eb5f-9bd7-4894-8d87-414ebac7e32e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:18:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:54:03Z" name: builder-dockercfg-8wltl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1607eb5f-9bd7-4894-8d87-414ebac7e32e resourceVersion: "27886" uid: 2fc6ace3-f0c4-448a-8315-1e0b12de2c97 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T16:17:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"25d02b36-f050-435f-afce-193b50ea6b97"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:17:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:53:59Z" name: default-dockercfg-jqptk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 25d02b36-f050-435f-afce-193b50ea6b97 resourceVersion: "27722" uid: 9b1f58e3-25cf-408c-b0a7-6ac045684726 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T16:18:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"24b03820-e209-4feb-afb5-bf59074492d5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:18:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:54:03Z" name: deployer-dockercfg-7kxwc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 24b03820-e209-4feb-afb5-bf59074492d5 resourceVersion: "27869" uid: b4fad267-5b72-40b8-b07c-e51dceca509c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T16:17:58Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fb182bc5-b1d8-4146-b5ff-69ad0a7613e7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:17:58Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:53:59Z" name: gather-dockercfg-djht9 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: fb182bc5-b1d8-4146-b5ff-69ad0a7613e7 resourceVersion: "27729" uid: 0a428890-9319-4ffe-9bdc-35915ecd02f4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T16:17:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d059a801-a5a8-4aeb-a6ca-ac7ae3dd3d31"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:17:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:53:59Z" name: insights-runtime-extractor-sa-dockercfg-llksk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: d059a801-a5a8-4aeb-a6ca-ac7ae3dd3d31 resourceVersion: "27726" uid: fe487ca7-3849-41c3-affc-1aa5e0940c79 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T16:24:04Z" service.beta.openshift.io/expiry: "2028-04-21T16:24:04Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: fe7e6fd0-9622-41ec-8687-5231d05605d6 creationTimestamp: "2026-04-22T16:24:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"fe7e6fd0-9622-41ec-8687-5231d05605d6"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T16:24:05Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: fe7e6fd0-9622-41ec-8687-5231d05605d6 resourceVersion: "7797" uid: acd65898-58d4-4f53-9c0a-f460c5f04fc6 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T16:24:04Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 481a90ea-c5c0-46e8-b05f-aa2ae3e8e2b0 service.beta.openshift.io/expiry: "2028-04-21T16:24:04Z" creationTimestamp: "2026-04-22T16:24:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"481a90ea-c5c0-46e8-b05f-aa2ae3e8e2b0"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T16:24:05Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 481a90ea-c5c0-46e8-b05f-aa2ae3e8e2b0 resourceVersion: "7799" uid: 1d6ec06b-6fc0-41a2-a07e-8c8ee22d4c8b type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T16:17:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7504a60a-8095-4c99-81ca-4c86ba6a3541"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T16:17:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:53:59Z" name: operator-dockercfg-t87h9 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 7504a60a-8095-4c99-81ca-4c86ba6a3541 resourceVersion: "27732" uid: d207c1a0-03bf-4b62-861d-0bd177a384ec type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47916"