--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T14:22:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5f3ee0b1-684b-4f86-bd1c-003edfd5f43c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:08Z" name: builder-dockercfg-ctrc8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 5f3ee0b1-684b-4f86-bd1c-003edfd5f43c resourceVersion: "39468" uid: 7c713848-5255-48db-81bb-ffc4ba35e65a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T14:22:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e3904d34-b396-4a4d-bade-4694c7d18000"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:03Z" name: default-dockercfg-s8x7h namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: e3904d34-b396-4a4d-bade-4694c7d18000 resourceVersion: "39291" uid: 8dbb196d-95ce-4862-bd13-cc2ecbf36ca9 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T14:22:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"659363ab-dc17-4644-a9d5-0acff62f9ac4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:08Z" name: deployer-dockercfg-9vxmz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 659363ab-dc17-4644-a9d5-0acff62f9ac4 resourceVersion: "39480" uid: dc15757a-5333-4ce7-939c-b285a4febe90 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-21T14:22:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5b3bfb47-fed1-4673-8c9c-a66d500f7e01"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:03Z" name: gather-dockercfg-rzlcx namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 5b3bfb47-fed1-4673-8c9c-a66d500f7e01 resourceVersion: "39292" uid: d79af5f7-e6f1-4e41-bc70-019c7bae1492 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-21T14:22:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"33520827-244e-4da5-ae20-ad6a2c0e219d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:03Z" name: insights-runtime-extractor-sa-dockercfg-qlm9d namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 33520827-244e-4da5-ae20-ad6a2c0e219d resourceVersion: "39308" uid: 58400a5a-f91c-4098-b1e5-b4aedd62239d type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T14:28:00Z" service.beta.openshift.io/expiry: "2028-04-20T14:28:00Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 8bc37dfb-6b32-422f-9174-5a3b988c29df creationTimestamp: "2026-04-21T14:28:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"8bc37dfb-6b32-422f-9174-5a3b988c29df"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T14:28:01Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 8bc37dfb-6b32-422f-9174-5a3b988c29df resourceVersion: "7771" uid: f7641cd0-91ab-4862-b3fb-f6658314a9b2 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T14:28:01Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 8070ba21-2316-4228-85f3-fc4267525200 service.beta.openshift.io/expiry: "2028-04-20T14:28:01Z" creationTimestamp: "2026-04-21T14:28:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8070ba21-2316-4228-85f3-fc4267525200"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T14:28:01Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 8070ba21-2316-4228-85f3-fc4267525200 resourceVersion: "7774" uid: 0146aa55-42e7-4812-b834-abc164262e8a type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-21T14:22:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f6d3a942-f427-4cce-bacb-9006cab43169"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T14:22:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T14:58:03Z" name: operator-dockercfg-ds462 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: f6d3a942-f427-4cce-bacb-9006cab43169 resourceVersion: "39296" uid: a824e64e-eb3b-474e-9270-1b593a6133a8 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "51021"