--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T20:40:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"df37c7c0-a539-4113-bef3-a8a03ef9639f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:40:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:41:13Z" name: builder-dockercfg-bg2vg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: df37c7c0-a539-4113-bef3-a8a03ef9639f resourceVersion: "4250" uid: fc25a912-ef8c-401c-b2ea-f4a6567cb8ca type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T20:40:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0247384a-c78d-4c4f-987c-9082a59c5443"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:40:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:41:10Z" name: default-dockercfg-cvg6v namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0247384a-c78d-4c4f-987c-9082a59c5443 resourceVersion: "4099" uid: 5fe462e9-ee28-42e5-93af-3b1e9f60a29f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T20:40:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5f29415a-798b-4a15-a34d-37277fc3dbe7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:40:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:41:13Z" name: deployer-dockercfg-2j68z namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 5f29415a-798b-4a15-a34d-37277fc3dbe7 resourceVersion: "4251" uid: 4367e55c-d60c-4874-8cc9-ea7f6b50af63 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T20:40:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e34b6c1c-a58a-4941-ad53-899bd65b9b9e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:40:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:41:10Z" name: gather-dockercfg-9svsz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: e34b6c1c-a58a-4941-ad53-899bd65b9b9e resourceVersion: "4098" uid: d7867774-6415-4d74-8a13-69b8c9321623 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T20:40:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c35316f4-34a8-412b-8e45-9447cff611e9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:40:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:41:10Z" name: insights-runtime-extractor-sa-dockercfg-jrrs2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: c35316f4-34a8-412b-8e45-9447cff611e9 resourceVersion: "4100" uid: 2a78bb2b-07b7-4f93-84dc-65f963fc1aac type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:46:42Z" service.beta.openshift.io/expiry: "2028-04-16T20:46:42Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 898ab63f-385a-4674-8e36-109586870d8c creationTimestamp: "2026-04-17T20:46:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"898ab63f-385a-4674-8e36-109586870d8c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:46:43Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 898ab63f-385a-4674-8e36-109586870d8c resourceVersion: "7862" uid: 09145790-a54f-4f0a-bca8-8485454be86a type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T20:46:37Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 85a362c6-8277-4d7b-870e-c246207bb0fd service.beta.openshift.io/expiry: "2028-04-16T20:46:37Z" creationTimestamp: "2026-04-17T20:46:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"85a362c6-8277-4d7b-870e-c246207bb0fd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T20:46:38Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 85a362c6-8277-4d7b-870e-c246207bb0fd resourceVersion: "7770" uid: a532ba1c-c3f3-4715-b6bb-4accaba89066 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T20:40:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5c149744-ab42-4d5e-8d64-66f0c17f989e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T20:40:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T20:41:10Z" name: operator-dockercfg-7dgc7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 5c149744-ab42-4d5e-8d64-66f0c17f989e resourceVersion: "4103" uid: c91189c5-74d4-46b1-b866-99c863297d64 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "29281"