--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T23:09:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"989d9ede-8ef6-494e-9117-008832ab6faf"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:48Z" name: builder-dockercfg-g5jbz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 989d9ede-8ef6-494e-9117-008832ab6faf resourceVersion: "4365" uid: 0c37a110-0eb8-4d09-8020-ab6976254a19 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T23:09:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2e7da3d6-7d56-4edd-94f7-8074ded2a638"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:46Z" name: default-dockercfg-nb2rt namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2e7da3d6-7d56-4edd-94f7-8074ded2a638 resourceVersion: "4211" uid: e649f011-39ea-47c3-b364-1287ef46313e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T23:09:08Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bdc96ee8-3a2a-4136-b3d3-bcb0b3ec994e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:08Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:48Z" name: deployer-dockercfg-6fsm2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: bdc96ee8-3a2a-4136-b3d3-bcb0b3ec994e resourceVersion: "4364" uid: 376e6d93-aacd-4537-8305-3f9811b322eb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-20T23:09:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"18c3ffc0-6605-4b95-acc5-e4605f7837bb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:46Z" name: gather-dockercfg-fgcbr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 18c3ffc0-6605-4b95-acc5-e4605f7837bb resourceVersion: "4212" uid: 59f83ec5-ddea-4f42-aa14-442bab3778ce type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-20T23:09:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9ee0be33-0e08-4945-b779-f8d61598aa1d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:46Z" name: insights-runtime-extractor-sa-dockercfg-clbx8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 9ee0be33-0e08-4945-b779-f8d61598aa1d resourceVersion: "4213" uid: 334a3d3e-6469-4fb0-b705-7fc39dd68808 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T23:13:22Z" service.beta.openshift.io/expiry: "2028-04-19T23:13:22Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 5f16ad0f-cf54-47c8-b291-54702aaf50d3 creationTimestamp: "2026-04-20T23:13:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5f16ad0f-cf54-47c8-b291-54702aaf50d3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T23:13:22Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 5f16ad0f-cf54-47c8-b291-54702aaf50d3 resourceVersion: "7496" uid: 611def23-a1d6-41dd-942c-107ef973944c type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T23:12:52Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 38ed8249-2b52-4784-8a5b-5415ff3b5630 service.beta.openshift.io/expiry: "2028-04-19T23:12:52Z" creationTimestamp: "2026-04-20T23:12:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"38ed8249-2b52-4784-8a5b-5415ff3b5630"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T23:12:53Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 38ed8249-2b52-4784-8a5b-5415ff3b5630 resourceVersion: "6362" uid: e00c0d1b-58dc-4e53-a60f-7605313958f5 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-20T23:09:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"723e1a6b-c6c1-441d-ac6c-8fdb267fcaeb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T23:09:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T23:09:46Z" name: operator-dockercfg-bkvhb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 723e1a6b-c6c1-441d-ac6c-8fdb267fcaeb resourceVersion: "4214" uid: b700cd1b-c06b-42c5-8b3c-f41ff02ea3e1 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "30274"