--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T14:18:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1a8c95ae-d078-4a3c-b7da-16ae1783d0a7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:10Z" name: builder-dockercfg-v9wh7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1a8c95ae-d078-4a3c-b7da-16ae1783d0a7 resourceVersion: "43249" uid: b0bf1ab6-8885-4e69-bc76-57acce6f7664 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T14:18:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bafadf72-c17b-4086-88a3-2f691d90133d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:07Z" name: default-dockercfg-75jjn namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: bafadf72-c17b-4086-88a3-2f691d90133d resourceVersion: "43104" uid: 5b6fc842-3519-4803-9a1d-59c1e0b09d62 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T14:18:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80348f03-d741-4afb-b9a5-a9f7cbc40da8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:10Z" name: deployer-dockercfg-d2dmw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 80348f03-d741-4afb-b9a5-a9f7cbc40da8 resourceVersion: "43279" uid: a9eb3736-3635-4e1b-859f-43c23d732fc9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T14:18:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e986fc29-097c-4700-8472-7c569e4535da"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:07Z" name: gather-dockercfg-czzrc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: e986fc29-097c-4700-8472-7c569e4535da resourceVersion: "43103" uid: 026f8acb-343d-418e-b2dc-9481d954f703 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T14:18:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c4466715-cf6a-4701-9b82-9b8463f163fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:07Z" name: insights-runtime-extractor-sa-dockercfg-j9ndf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: c4466715-cf6a-4701-9b82-9b8463f163fd resourceVersion: "43127" uid: 1e39886b-ea8c-4666-bf8b-6b73a759b2d2 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJSjhhdndaWGhFdEV3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXpOVGd3TXpBZQpGdzB5TmpBME1UY3hOREl6TXpWYUZ3MHlPREEwTVRZeE5ESXpNelphTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFMMEljZ3JyTDFPSjE1enNvUEp2SUM3ZmdQUE1uZlpZaDBwVWZxUGFINDdOaVZPMApQUW13Tlc2TW1WMHpCeXFRZWd6MEE3Z1ErUFdYVFB5bWJpYkVDNEh0SnhmYm1hd3d1T3NYejlqNGdEUFFqTlJJCmxSYTIxOWdEM0FlY3p2cFRiUVV3R3BRcnhHbDd2TWF0Tmw0cnhYNkYwTFRUOG55aWZRUzQrMzhNUXRwOFFiL3IKWm1PM3pkbmIzNlBvbFVuMVo3VUc1Uy9EOVRtazkxTURaY1dhNkRlQ2l3SlFDSjRneVViNktISU8wYktxM1hhYwphTW4wNllQNkdOVXM2MjB1UEJIVkl6ZUQ5NmVOb3Z2SjY5bUZLdG53NU9RcmZNendhYk5OUlZib0dQeFVSSWZaClUrc3FUYVZsSjNnalBUUFJ3TlY1UFNXRFJGVDFwQVBFOTdieENsa0NBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCUUlQU2hHUVFNUHRSODVrUWF6ZVpHTDRkQ2V2ekFmQmdOVkhTTUVHREFXZ0JRSFRTc0R5N1J3Cjdrc1RkZVc4bmV1dHhybnU4ekNCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rWkRRd01HVTFZbUl0TmpnNU1pMDBaRFV3TFRnME0ySXRNemd3TjJFMgpOemczWkdaaE1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQWlhYmJGd3M1UEhDMmVkeVlYOERLMWVJMWxKMFJBCkhkdlV2Wm5EWmVncEZHT2puelg3aE1EK00rMmFhL3FvQXhXMVA0dVNCWlJaY1RUTk1FREl0YUxjaDZ2SDNyaTgKY0R6Zm5Za3BDR0krcHhDcnN1cUJMRWpqandiU1lJTGJkQXpXdUJaTm5ZOG4ydGd6T0g5MDNHbjB4VmtWVjlaaApKSFlqdzFUTlBVRlNmVjFwak1nc3ByOVRQcGhlckk0SlZpZ2ZTMlJIZzFjeVJiOEIvdEEweStiMzlLczhwV1BaCk8za0czbUNYTjhlUVptSHRnQUtqR0h5QzVlcTZlaUg0K2NxdXJuZlZiWE1RS0grdGEvdjBsWEZ2bElEZkZJaGUKYWppZC9wQVdSbWt2Ym5JQ2liOEUrTnVyQnhwSVFjZ3luVTQxNnU0NnFjaXJKV2tURk1iWWpqdnYKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlEM2IxVXRRazFqc3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpRek5UZ3dNekFlCkZ3MHlOakEwTVRjeE5ESXpNak5hRncweU9EQTJNVFV4TkRJek1qUmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTBNelU0TURNd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEalVMcm5uUXF0STNhd2VzNVpGZlViOFB3bUpHWGxXMGtzCjVBYTN6WU1PUVROeXVlWkdmRFphcXA0dmRIbjBOVlUvYjFWaFVHcFoxUlBSTklaVXdwdGI3RW1nWkVKV251OTMKaXlFUGliekdaMFZNamg1V0NhR1RmbEQraFdoQ3FycmRRWDJGOGxRZUpuRnFKTjBkN0lyazUvM1piWitlZURXMAorcFZUYnhHbmFnaXcydVEreWo3S1kvRWpWTW9NdXZEMmpreXA1RVk1clhEVFV0Vld2QlNpRlJmQ2JJYjJSWHhuCk50a1gxZWtlRmUreFZLeWJQb1RTdU1XSGcxU2xUSWZPRHBZZWRoeExEVGlwa2x6YVZ5dHI4Y1FEb0swbHpUSWwKWWZESndLYnRxOWZNRktYakVTZmJaSHZMaTVLRzhXdVlhdzZ5K0w3S3pOejE4dzkxWFNybkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUUhUU3NECnk3Unc3a3NUZGVXOG5ldXR4cm51OHpBZkJnTlZIU01FR0RBV2dCUUhUU3NEeTdSdzdrc1RkZVc4bmV1dHhybnUKOHpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWUxOE1qSEh3UUhwVWRXWTlHdXV3L20vTXAzUEdjVVpWeUptSApqSHMzTy8zRDZKNXJheWEyeTFaZHZha25LS2hMWGdYSHpYYTlqQW1ySGdmd3BrVlpZanhvZ1BJelMydXNmZEowCnFzMFhsWTJnZ09HVVhOSHptUGFnNGxtV1g5WmtXYTlGb1I3WWpDWE5NVU1SaHExbWhrY3FYKytlWmI4UlFFbG4KekhqS1hxZGcvQ0NrNmh2dVdyWGMwNW9CZ3lmSGd3R2YrSnpnWDd5aG1JbjdKWC91aGQ5azlOZUlJcnI4L3FjYQp6Q1kwZzY2UEdDQ05ya1RBVkNFSHNJbGZmUDhhNWNIVGxqckFEcnpTczRIbVF5RGpOd01MLzdUQkVoMXYzWCtZCkVuRzdGMmF6TUFqSllTdk5UNDFBTWRsWnFFWWoxb21YYVgremhwSHFpQVJCNVN2UGhnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:23:36Z" service.beta.openshift.io/expiry: "2028-04-16T14:23:36Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: d400e5bb-6892-4d50-843b-3807a6787dfa creationTimestamp: "2026-04-17T14:23:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"d400e5bb-6892-4d50-843b-3807a6787dfa"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:23:36Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: d400e5bb-6892-4d50-843b-3807a6787dfa resourceVersion: "7779" uid: c1fab772-a819-4e38-b580-fdbe5396c587 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJY0ZrRWJBNms3Tk13RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXpOVGd3TXpBZQpGdzB5TmpBME1UY3hOREl6TWpsYUZ3MHlPREEwTVRZeE5ESXpNekJhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQU5kcEV5dUk5dFkrVEpZK3I3dnhyZUJZMFgzNTFDSks0VVNFeUFFTUU4TDcyWFNpZmVaSwpqd2RVelcwRm1DVUNqaE85TTljYmlBbTlRUVZVQnducWx6MlROWGlOQVdYcVV5bmlNRUZvWDV3VndVOHFQUXlaCnZ0L3R3ZmcwSTAwL01TOXo2STdGNG9jRklrUy9FUm1qUWRncDU0RWppbklBcmhReFRlUCszQytORUN0Nzl3NFEKZzFsTktpZGhCNWxjT0Q5azNrU0NUcjJIektVUWZZK1pjbzRxOFlZQXU1cHVXK2VnT0E4RCtzSUN0ZWJqdmVOcApqQk1OVm1GYXhMQWt2VDFtKytpaGtGNlA5aThhZkdrd1ZwUlJYeWVubTdjQWYyQkRKTjZFZmZ3eHVOTGJtaDdvCnRINm84RExYY0VoSjUzUXpCQWtudmVQQkkxNHhoVlhUSVgwQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJTNjF3RDMzdkVhWU9CejFyb0xyL1pOamVGMTlUQWZCZ05WSFNNRUdEQVdnQlFIVFNzRHk3Unc3a3NUCmRlVzhuZXV0eHJudTh6QlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkRSbE1tUmpZalV5TFRSa04yWXRORFEzTUMwNU5qazNMVEptCk5tSTBPR1F5T0RReFlUQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUF4bWE0NGtVSVlvaXdnbGRVYmpxekF1MUkKVllZNjVMTjBnV2VJNi9xSmpSNmI4WURNOEtrRkF5WWtYQ2JUeW0zVTdNUXg3QXlENmtmeUxTZUtuN1dEN1NnUgp4Vjl3VExndDZEY0tQR05PNjJQVmtqUTh4NkhZcTN4RXhDeTlFMVdkMmNOWEY5cGtRMEQ1VUZtZnlMbkx2TU55CmFWMnNIeVV6RHdpVzNTajNHc2I2V21Xa0tMblZDL3RzUkd6Mnd5d1hzVUhVRzRuRjE1d1FMa25FK1Zoa2htS1cKN0RIelFyUFgxb0FsYm0yNStKaGpSdGwyQ1BtT0N2bjh1WTBJNzJDeE4rZEtoamtTc0RNcnZQNEdLcVdTakpMUgpsT2hjQ2RZMzQrSk1EaVVTT00vd1NqY0x3alVDdXRuVmVVcGtsbkhaZHlnTVZyYzdQcStSajJsMUdEdHl2QT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJRDNiMVV0UWsxanN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qUXpOVGd3TXpBZQpGdzB5TmpBME1UY3hOREl6TWpOYUZ3MHlPREEyTVRVeE5ESXpNalJhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelkwTXpVNE1ETXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRGpVTHJublFxdEkzYXdlczVaRmZVYjhQd21KR1hsVzBrcwo1QWEzellNT1FUTnl1ZVpHZkRaYXFwNHZkSG4wTlZVL2IxVmhVR3BaMVJQUk5JWlV3cHRiN0VtZ1pFSldudTkzCml5RVBpYnpHWjBWTWpoNVdDYUdUZmxEK2hXaENxcnJkUVgyRjhsUWVKbkZxSk4wZDdJcms1LzNaYlorZWVEVzAKK3BWVGJ4R25hZ2l3MnVRK3lqN0tZL0VqVk1vTXV2RDJqa3lwNUVZNXJYRFRVdFZXdkJTaUZSZkNiSWIyUlh4bgpOdGtYMWVrZUZlK3hWS3liUG9UU3VNV0hnMVNsVElmT0RwWWVkaHhMRFRpcGtsemFWeXRyOGNRRG9LMGx6VElsCllmREp3S2J0cTlmTUZLWGpFU2ZiWkh2TGk1S0c4V3VZYXc2eStMN0t6TnoxOHc5MVhTcm5BZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlFIVFNzRAp5N1J3N2tzVGRlVzhuZXV0eHJudTh6QWZCZ05WSFNNRUdEQVdnQlFIVFNzRHk3Unc3a3NUZGVXOG5ldXR4cm51Cjh6QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFlMThNakhId1FIcFVkV1k5R3V1dy9tL01wM1BHY1VaVnlKbUgKakhzM08vM0Q2SjVyYXlhMnkxWmR2YWtuS0toTFhnWEh6WGE5akFtckhnZndwa1ZaWWp4b2dQSXpTMnVzZmRKMApxczBYbFkyZ2dPR1VYTkh6bVBhZzRsbVdYOVprV2E5Rm9SN1lqQ1hOTVVNUmhxMW1oa2NxWCsrZVpiOFJRRWxuCnpIaktYcWRnL0NDazZodnVXclhjMDVvQmd5Zkhnd0dmK0p6Z1g3eWhtSW43SlgvdWhkOWs5TmVJSXJyOC9xY2EKekNZMGc2NlBHQ0NOcmtUQVZDRUhzSWxmZlA4YTVjSFRsanJBRHJ6U3M0SG1ReURqTndNTC83VEJFaDF2M1grWQpFbkc3RjJhek1BakpZU3ZOVDQxQU1kbFpxRVlqMW9tWGFYK3pocEhxaUFSQjVTdlBoZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:23:30Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 4e2dcb52-4d7f-4470-9697-2f6b48d2841a service.beta.openshift.io/expiry: "2028-04-16T14:23:30Z" creationTimestamp: "2026-04-17T14:23:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"4e2dcb52-4d7f-4470-9697-2f6b48d2841a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:23:31Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 4e2dcb52-4d7f-4470-9697-2f6b48d2841a resourceVersion: "7658" uid: aa650a76-72cb-4cab-8fc8-926637659f55 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T14:18:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c696800-b645-41a2-868d-c439579b1925"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:18:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:54:07Z" name: operator-dockercfg-v4ssd namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 5c696800-b645-41a2-868d-c439579b1925 resourceVersion: "43100" uid: 1b49e7d6-df5c-4e03-aa4a-6ba2c56fc7dd type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46144"