--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T18:39:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"347a8dc1-8bd9-403c-8ef8-119224f2e196"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:06Z" name: builder-dockercfg-jqgq6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 347a8dc1-8bd9-403c-8ef8-119224f2e196 resourceVersion: "41052" uid: f9558ff8-671f-4d34-aa7d-7b8aefc13114 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T18:39:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"07bc8b81-6f52-4077-9c1d-751d1f6df437"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:02Z" name: default-dockercfg-mvm9t namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 07bc8b81-6f52-4077-9c1d-751d1f6df437 resourceVersion: "40842" uid: 187247b2-43d1-4baa-82b5-c0e2cc2d64c3 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T18:39:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1756c67b-4a53-4bf4-af97-a046e16b2dbe"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:06Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:06Z" name: deployer-dockercfg-7hfks namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 1756c67b-4a53-4bf4-af97-a046e16b2dbe resourceVersion: "41060" uid: c61c5fdf-7a3b-4e77-879c-41282257c0fc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T18:39:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1e185cb4-ff94-49e5-9ae0-a22e3e33619a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:02Z" name: gather-dockercfg-brjmp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 1e185cb4-ff94-49e5-9ae0-a22e3e33619a resourceVersion: "40828" uid: 506eba1e-1780-4520-adbf-0ebeab55b223 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T18:39:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6db0b396-3430-436d-bed9-6e71ffaa4d57"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:02Z" name: insights-runtime-extractor-sa-dockercfg-h7vq4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 6db0b396-3430-436d-bed9-6e71ffaa4d57 resourceVersion: "40851" uid: fcc6a55c-9e1d-44a1-99d1-38903ebd8c7a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:45:05Z" service.beta.openshift.io/expiry: "2028-04-21T18:45:05Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 359e3141-4668-43f7-90f2-d66cfd76ce4f creationTimestamp: "2026-04-22T18:45:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"359e3141-4668-43f7-90f2-d66cfd76ce4f"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:45:06Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 359e3141-4668-43f7-90f2-d66cfd76ce4f resourceVersion: "7897" uid: 55ae4c08-3ba3-4a1b-9908-17a148c0b823 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T18:45:05Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: a5b10698-82f5-42b8-9ebe-623be8dadf1c service.beta.openshift.io/expiry: "2028-04-21T18:45:05Z" creationTimestamp: "2026-04-22T18:45:06Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"a5b10698-82f5-42b8-9ebe-623be8dadf1c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T18:45:06Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: a5b10698-82f5-42b8-9ebe-623be8dadf1c resourceVersion: "7900" uid: 305521c3-27ef-4608-ac7a-8034c875b73d type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T18:39:01Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b4ef05e6-f078-43f2-9dac-260dacb1ff69"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T18:39:01Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T19:15:02Z" name: operator-dockercfg-bggc9 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: b4ef05e6-f078-43f2-9dac-260dacb1ff69 resourceVersion: "40848" uid: d5f2254d-95a5-48fe-9b58-dfedaa450a2f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46680"