--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T17:30:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bbee0932-933e-4efe-9f0b-50d24233bc79"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:22Z" name: builder-dockercfg-7f9tp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bbee0932-933e-4efe-9f0b-50d24233bc79 resourceVersion: "43588" uid: 61e7f4cf-c731-4c86-8390-ce2e01768663 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T17:30:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a7a47491-7114-4e83-8fa3-f496fbbd3e13"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:17Z" name: default-dockercfg-9w5fh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: a7a47491-7114-4e83-8fa3-f496fbbd3e13 resourceVersion: "43389" uid: 552e35db-cfdb-4a8a-b391-075086bd96c2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T17:30:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a75d3347-64ff-42d2-a59d-f1e80c245093"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:22Z" name: deployer-dockercfg-qtb5n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a75d3347-64ff-42d2-a59d-f1e80c245093 resourceVersion: "43581" uid: 0422f739-05a9-4167-8eb9-f98bdcfe44de type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-21T17:30:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"39ad778e-dc44-4e30-aba4-b4c533501b35"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:17Z" name: gather-dockercfg-9sxkj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 39ad778e-dc44-4e30-aba4-b4c533501b35 resourceVersion: "43373" uid: d32cf502-a2af-425c-953c-2c7f7af013d1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-21T17:30:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"264e7497-8583-4176-b434-d51889ee4ca3"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:17Z" name: insights-runtime-extractor-sa-dockercfg-55shw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 264e7497-8583-4176-b434-d51889ee4ca3 resourceVersion: "43391" uid: a5722845-8c94-44dd-a168-86e5da38a4bb type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T17:36:02Z" service.beta.openshift.io/expiry: "2028-04-20T17:36:02Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 84beab91-7903-4ac3-8a5c-f294ff3f4f93 creationTimestamp: "2026-04-21T17:36:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"84beab91-7903-4ac3-8a5c-f294ff3f4f93"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T17:36:03Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 84beab91-7903-4ac3-8a5c-f294ff3f4f93 resourceVersion: "7732" uid: 1e8e86d5-85d2-454b-9f03-6b4678dad210 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T17:36:03Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 9d61af44-fab7-4e17-b2c6-edf88c632c35 service.beta.openshift.io/expiry: "2028-04-20T17:36:03Z" creationTimestamp: "2026-04-21T17:36:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"9d61af44-fab7-4e17-b2c6-edf88c632c35"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T17:36:03Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 9d61af44-fab7-4e17-b2c6-edf88c632c35 resourceVersion: "7738" uid: f1d9f434-498a-4412-959f-a6da7564b760 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-21T17:30:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8a969cb6-fd78-4625-8580-febcf9039f53"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T17:30:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T18:06:17Z" name: operator-dockercfg-rp2d8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 8a969cb6-fd78-4625-8580-febcf9039f53 resourceVersion: "43384" uid: af6c7902-a3c0-48f1-8f76-545b446c63ea type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47376"