--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T07:46:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a6e5ef21-6a34-46d6-9790-200c7a124382"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T07:46:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T08:22:40Z" name: builder-dockercfg-5f86t namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: a6e5ef21-6a34-46d6-9790-200c7a124382 resourceVersion: "42508" uid: 6d4b5cd5-2930-44dc-8eb1-e6de3cff3c16 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T07:46:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c5a91e23-1dde-46ec-8d27-4c98bbc416aa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T07:46:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T08:22:36Z" name: default-dockercfg-lfrjj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c5a91e23-1dde-46ec-8d27-4c98bbc416aa resourceVersion: "42363" uid: 63437ee2-6d3e-4380-983e-23002d4a6261 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T07:46:40Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9f0cfa7d-0f0a-4325-9a69-6424504e350b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T07:46:40Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T08:22:40Z" name: deployer-dockercfg-qtr22 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 9f0cfa7d-0f0a-4325-9a69-6424504e350b resourceVersion: "42515" uid: 308870d5-e87b-4024-ad45-a717df3363bb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-20T07:46:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d573cae0-1711-49f5-a58d-0b32d3b289a5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T07:46:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T08:22:36Z" name: gather-dockercfg-vqwf6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: d573cae0-1711-49f5-a58d-0b32d3b289a5 resourceVersion: "42361" uid: 29e2e489-50f8-402e-9c12-66de0d034c1e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-20T07:46:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8d704738-a9d5-4b7b-82ba-0a1602b8cbb1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T07:46:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T08:22:36Z" name: insights-runtime-extractor-sa-dockercfg-lvs8m namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 8d704738-a9d5-4b7b-82ba-0a1602b8cbb1 resourceVersion: "42356" uid: 7152ad7c-c0b6-44c8-b944-c571bdcc5bde type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T07:52:32Z" service.beta.openshift.io/expiry: "2028-04-19T07:52:32Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 0d589658-e1ac-427a-a477-7f7192b77d85 creationTimestamp: "2026-04-20T07:52:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"0d589658-e1ac-427a-a477-7f7192b77d85"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T07:52:33Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 0d589658-e1ac-427a-a477-7f7192b77d85 resourceVersion: "7703" uid: 9243daf9-477c-44ba-822e-44c8a72a45ae type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T07:52:32Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: ae708a95-f803-4c45-a985-5e77f93fafe7 service.beta.openshift.io/expiry: "2028-04-19T07:52:32Z" creationTimestamp: "2026-04-20T07:52:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ae708a95-f803-4c45-a985-5e77f93fafe7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T07:52:33Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: ae708a95-f803-4c45-a985-5e77f93fafe7 resourceVersion: "7700" uid: 6b4b423d-4c57-425a-a2de-e77e0bdde188 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-20T07:46:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6082ecf1-eeed-4465-b252-b471c75b7271"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T07:46:36Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T08:22:36Z" name: operator-dockercfg-dhk79 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 6082ecf1-eeed-4465-b252-b471c75b7271 resourceVersion: "42366" uid: 8c7a38c6-4a51-43de-b733-561da546b8b8 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "47415"