--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T00:00:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9b2e2a90-164c-4c0a-8ff7-9409593b471e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:09Z" name: builder-dockercfg-27f82 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9b2e2a90-164c-4c0a-8ff7-9409593b471e resourceVersion: "45152" uid: bf264bd5-e7b7-495d-a820-ca7ae058d8ee type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T00:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"07d2a886-fb6e-4566-af2e-da497e265e00"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:05Z" name: default-dockercfg-7vkkz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 07d2a886-fb6e-4566-af2e-da497e265e00 resourceVersion: "44994" uid: e533fc1c-3dbd-4049-b0f9-c5241bf8c627 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T00:00:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"830fdf52-e885-4b73-90f1-0ec596b33cb5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:09Z" name: deployer-dockercfg-dpkxm namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 830fdf52-e885-4b73-90f1-0ec596b33cb5 resourceVersion: "45141" uid: 7800ec39-c703-411b-8a92-4f1a9ba06368 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-21T00:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"09ee0bb2-570a-4157-8949-050ffd3d4fdd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:05Z" name: gather-dockercfg-xsh6t namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 09ee0bb2-570a-4157-8949-050ffd3d4fdd resourceVersion: "44984" uid: 9d3bfc9b-618a-44fa-8ba4-3c58a199bde2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-21T00:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"faf08c00-5022-47e7-a0f3-45048f000c3b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:05Z" name: insights-runtime-extractor-sa-dockercfg-pjwht namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: faf08c00-5022-47e7-a0f3-45048f000c3b resourceVersion: "44993" uid: bc20d27d-d00e-40a4-b653-9d1c09da8ac6 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJY1dIQ21kejZOYjh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3lPVGd5T1RBZQpGdzB5TmpBME1qRXdNREEwTUROYUZ3MHlPREEwTWpBd01EQTBNRFJhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFMbk5ScEVsQk5kdzNpUHRkUzNuOU1CYll1RDdTSWw1TzI3ZVFoYUQxR0JIU2E4OQpES2o0WUhWNUovRkxZK3B6eTdETXN0RzBkV2N4R0V6UzBnUHFERHo4Y25YbWd4TUQyNnMvQTNDREF5M2JCdDdlCjRjVjd1aXVYNFpLVXJpcldsRmFFSUQ2eFhoQ09MQlhWdUlRVjZBbVk3b2lGRUc3Z2NNVWJwVGlYNHhvZkJDZWEKMzJOSzJyQjc1S3E3Uy96czV1ODNCdmRuWEl5THcxTEVWd094bkxPY1pJVVcwR1plS0xoaXpONUxBT0JMQzlRKwpQU1VHY3kvaDArUEREWjcyMWk0WFpPRktqV2loUlRYbGViU2ovb0Q1aTB2UWRabzJQS0NHckNJMzR4Vk00Zm11CnVtckZYZmNXbExuM0xkMlp1NjdzY1IxckZkeWcyVFl2UGNtU1NZVUNBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCU0RkRGt4QkwvdTFFdVlYdmlPQjJwUjFTQ3UzVEFmQmdOVkhTTUVHREFXZ0JSWXlhRXdIRnJtCmw5YXZiTmFuTGFOemZ1UWcwRENCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rTnpsaU5URTJabUl0WXpGalpTMDBZek14TFRobFkySXRabVUzTnpBNQpObU5tTmpWaE1BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQlFPVXpMdlliNnk0ZVg2NmZQYTljV2U0MG1FSHFhCmtyN2FZSVpUQ0lMUyt5VzBwWTdnSUVrYjE5KytaTzZCTTVJUU1nTHlYUnhyaCs1ZFYrdUVtcHoxZWJxNjd5WHkKZFFSNFNyb20rV1BrendLblp1SFhITFFyYW90bitxYXBXdEJPcWJlQS92TEZKOEcyR1VUWGxVWFlxY3F5cHlKSgprajROOFFCaEFGR3pYcHlRd3duY1I1NGpPVGR3TXcrWGVrWmIxbWZlZGg5SFRHaDJHTFNOai96SldwT2hRcjNUCk9XanBXKzZmcldMeGZ6RTEvazR5c2xqUXM0SnZYckRicjlwVy9BdTFOWDc1eWI1U1hDamhrdnJ5MktyZGNBVTAKcWJhMllEcENTem5tb2lsZzc4SU50clRaTHRqeEVVaXZHNFE5d0Q0NSt6R1ROVlVmdTNqRHFBTkIKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUllNGM1ZENPTm9PY3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpjeU9UZ3lPVEFlCkZ3MHlOakEwTWpFd01EQXpORGxhRncweU9EQTJNVGt3TURBek5UQmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTNNams0TWprd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDcTNiOWloR2dsd2RybVZ1dUllWkQ3aFZ6UExQMXQwVUcyCmxTMDY2Y2UySzNRdC9MaEIwZW9rWFJnU2lYRndObGlSbnVWM1hjQk1JMEh5QUYzbkExdm56dUc4eEh1RjNuWk4KNU44YnM3RWRRRGV3M1RMZkVVcWxGWDFoS3lmTXZ3a0RTMTZOUHEwMEh2L3BGSkFsOFIvLzhUTXBrTUJVVXFBLwppUVM2eUJ1UFRNd0VCN29Ka1ZiVE92YTFib2hOTGhLdkExSi9RNjd3UlVuTWhBKzdlSmRBUGY2VExzNldJQVRoCnFIbjVFdVZidEl6MlJ2TWROUkFzbTdtZkxDVUFyQnA0RVJtRmJmU1V3RUhDbXFiZzJaUVk4K29qYTVSZ0lpRjcKb1MwMy9wZkhPSXhNL1l6NzdYVFRaZ2toaTRMNkYwRndiOGdwbXhOc1RDSmtpMTBQVjcyRkFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUll5YUV3CkhGcm1sOWF2Yk5hbkxhTnpmdVFnMERBZkJnTlZIU01FR0RBV2dCUll5YUV3SEZybWw5YXZiTmFuTGFOemZ1UWcKMERBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQUhUVzBzWEVYc0JEMHBVZkdWMHQrUTk1VS9vcFR3L25rdzJHOQpuaEh1ZE1JWkNJKzZrbGdDeUtEMmdPRjh3MEFxUTRVSTRYSjJnajRlcXorS2JUR0RZSzIvZUxxQkdDWVJnTldGCkp2UHdtS3hCUEozR2JXTzJveVVUVytUb2piUmd2dmM0Z25iVGhzZitsSUs3dlpqRUZLUWFxK0N3cnRYRnJjYnYKdTcxTERzOFBYSlpob28zZWtWa0dTam83b1UrQVNIMnp3Uy9UVG12RVVVak1hRmpweTJndmVSUUc4NnV4cWZFWgp2bDVwTXVhRDZxMm1OSHVNV0VxVmhyaXJwRTV4MHdJRllvTi9HTG9neEdBVlduSERTSTUrRFlpRDdmUnRGNFFNClVTamoybkNLUEw4MGRTeFRyQ0sxSTZNZ3hBQUxaTXhlb3A2cTBCQmI0OFhRalJ2Sml3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T00:04:04Z" service.beta.openshift.io/expiry: "2028-04-20T00:04:04Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 79b516fb-c1ce-4c31-8ecb-fe77096cf65a creationTimestamp: "2026-04-21T00:04:05Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"79b516fb-c1ce-4c31-8ecb-fe77096cf65a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T00:04:05Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 79b516fb-c1ce-4c31-8ecb-fe77096cf65a resourceVersion: "7489" uid: 2fe8aab1-c73c-4c7e-b08d-152599ea75a6 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJSWN3c3RjVUMzM3N3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3lPVGd5T1RBZQpGdzB5TmpBME1qRXdNREF6TlRoYUZ3MHlPREEwTWpBd01EQXpOVGxhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQUt3ZTBsT0NTZ002SGdHRStTeE5tVFJrYWUzbkNSQzNwV3lKQ2xpclZKM0lGOFJuU2dsRgozVm5XT0kyUFJnZThFdzZGMS9lb01BTGZwSXpBbVVmSitncVJnbEcxNnRzcWlNYXl0VDZRcm1teE55K1I3aXZGClJxWDRhM1pqOHp3cnZ6UXNaNk9WWXlBeFNGSXl5YmJwWUZrVTdXdmQvYzYvcW9RK1pVR3JFbGRqVkhPbENicGQKZXEwVkhTbnE1WXNCMy9URXNKcG1nc3J3cmdYMGRMSndCWmJoMUNiMkt4bGV0Y1NQY1U0NGZSQjRSYnRGanR2VwpJTVhRNUM1T1UvZTExd1V1am5UQ3g5YlVONU9uVXRHSzlVczZKekpVRWhkV3N2aUlZQzJoMmVCWHNMcURUR0xtCkk3dU9XL2paM1JjQ2lyM1lhT1ZSNUZncHpQNU5aQ0dDazIwQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJSL281RGhtcGhabmM5b2M1cDBUQ0ZFNjJ2OGtqQWZCZ05WSFNNRUdEQVdnQlJZeWFFd0hGcm1sOWF2CmJOYW5MYU56ZnVRZzBEQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkdaaU1XTm1aR013TFRJMU1tSXRORGRtTWkxaE1qazVMVGRrClpEbGxPR0ZoWWpWaFpUQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFjK1JlandMNnRkeWRYZkVmaTF1eEw4QXoKazMrd1BNYmN0b2tsTU1scEhuWWNFdHd5czBIMDZMZ3VEWGluOHlMNno4aG9pbUNId2M1d2lwVjEwY0xRbWloOQpCSXRNZWxnRFZZSVB6WHZvc3dwMkluUkdIcG1nMldkNlVNanJVd1lvZE9TSCsvRW42WEx3S2Jwcno1aVIvbFRpCmpwVG84MFdvV1VIa0RJM2pLbnVnelVLdG5kbDdTcXhRR1dFS3doRFgyVW5rcjlSSm5Bdk9vNDBNWXVyY3VQVUgKWEVodWZnZnBrcUNBYURPbnk1enp0L1Y3b3NEbkhCdXpoU1dzWE9TQmlFS0pwai9Lb3RQc1psM3J5MFFyVEMydwplU1NpM0VyOWRRZDVpRS9yNDRlRGIwYUIzUUlnK1ZYNCszVVdaWG5OMWRyYTFxV0dPZGNsR3pSTFVFVVJqUT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJZTRjNWRDT05vT2N3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qY3lPVGd5T1RBZQpGdzB5TmpBME1qRXdNREF6TkRsYUZ3MHlPREEyTVRrd01EQXpOVEJhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelkzTWprNE1qa3dnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ3EzYjlpaEdnbHdkcm1WdXVJZVpEN2hWelBMUDF0MFVHMgpsUzA2NmNlMkszUXQvTGhCMGVva1hSZ1NpWEZ3TmxpUm51VjNYY0JNSTBIeUFGM25BMXZuenVHOHhIdUYzblpOCjVOOGJzN0VkUURldzNUTGZFVXFsRlgxaEt5Zk12d2tEUzE2TlBxMDBIdi9wRkpBbDhSLy84VE1wa01CVVVxQS8KaVFTNnlCdVBUTXdFQjdvSmtWYlRPdmExYm9oTkxoS3ZBMUovUTY3d1JVbk1oQSs3ZUpkQVBmNlRMczZXSUFUaApxSG41RXVWYnRJejJSdk1kTlJBc203bWZMQ1VBckJwNEVSbUZiZlNVd0VIQ21xYmcyWlFZOCtvamE1UmdJaUY3Cm9TMDMvcGZIT0l4TS9Zejc3WFRUWmdraGk0TDZGMEZ3YjhncG14TnNUQ0praTEwUFY3MkZBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlJZeWFFdwpIRnJtbDlhdmJOYW5MYU56ZnVRZzBEQWZCZ05WSFNNRUdEQVdnQlJZeWFFd0hGcm1sOWF2Yk5hbkxhTnpmdVFnCjBEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFIVFcwc1hFWHNCRDBwVWZHVjB0K1E5NVUvb3BUdy9ua3cyRzkKbmhIdWRNSVpDSSs2a2xnQ3lLRDJnT0Y4dzBBcVE0VUk0WEoyZ2o0ZXF6K0tiVEdEWUsyL2VMcUJHQ1lSZ05XRgpKdlB3bUt4QlBKM0diV08yb3lVVFcrVG9qYlJndnZjNGduYlRoc2YrbElLN3ZaakVGS1FhcStDd3J0WEZyY2J2CnU3MUxEczhQWEpaaG9vM2VrVmtHU2pvN29VK0FTSDJ6d1MvVFRtdkVVVWpNYUZqcHkyZ3ZlUlFHODZ1eHFmRVoKdmw1cE11YUQ2cTJtTkh1TVdFcVZocmlycEU1eDB3SUZZb04vR0xvZ3hHQVZXbkhEU0k1K0RZaUQ3ZlJ0RjRRTQpVU2pqMm5DS1BMODBkU3hUckNLMUk2TWd4QUFMWk14ZW9wNnEwQkJiNDhYUWpSdkppdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T00:03:59Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: fb1cfdc0-252b-47f2-a299-7dd9e8aab5ae service.beta.openshift.io/expiry: "2028-04-20T00:03:59Z" creationTimestamp: "2026-04-21T00:04:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"fb1cfdc0-252b-47f2-a299-7dd9e8aab5ae"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T00:04:00Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: fb1cfdc0-252b-47f2-a299-7dd9e8aab5ae resourceVersion: "7368" uid: 9870709f-1012-4378-82c8-9ae060283135 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-21T00:00:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"04d2b98f-d8ff-4e45-9970-99c1fafab116"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T00:00:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T00:36:05Z" name: operator-dockercfg-4jdhf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 04d2b98f-d8ff-4e45-9970-99c1fafab116 resourceVersion: "45000" uid: a3a23a40-b26d-4e47-815a-351bf03f0c43 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "48153"