--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-21T04:20:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1a064c75-17a4-4cbc-80a4-2cd70e670de9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:20:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:20:58Z" name: builder-dockercfg-dmtft namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 1a064c75-17a4-4cbc-80a4-2cd70e670de9 resourceVersion: "4331" uid: aa43ec94-b051-4452-9e2e-e6a8aca915d2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-21T04:20:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0b88d371-5918-49d8-bf5d-7d95305b252b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:20:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:20:56Z" name: default-dockercfg-86tpj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0b88d371-5918-49d8-bf5d-7d95305b252b resourceVersion: "4175" uid: 83716892-de3b-4bbb-b44b-3065d250bb20 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-21T04:20:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4ea3af33-47f4-4e01-a6eb-c8e70e48ef15"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:20:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:20:58Z" name: deployer-dockercfg-b44rj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4ea3af33-47f4-4e01-a6eb-c8e70e48ef15 resourceVersion: "4330" uid: 83f69d0c-da51-44ba-87d1-08d4aab374af type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-21T04:20:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7bc9d81d-48fc-4487-b942-0d4dec7a132f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:20:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:20:56Z" name: gather-dockercfg-z54jg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 7bc9d81d-48fc-4487-b942-0d4dec7a132f resourceVersion: "4176" uid: 80e5c06d-4c60-4e14-a140-6f26b01a3ca1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-21T04:20:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"54dfe68d-ceb6-434f-b3ad-6526e4f71c22"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:20:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:20:56Z" name: insights-runtime-extractor-sa-dockercfg-qm4pr namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 54dfe68d-ceb6-434f-b3ad-6526e4f71c22 resourceVersion: "4179" uid: 2e4ae863-3ae5-42fa-8873-ad4fcfd24bae type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T04:26:17Z" service.beta.openshift.io/expiry: "2028-04-20T04:26:17Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 4d49c1d7-14e0-42eb-8b2a-46603b8e8b31 creationTimestamp: "2026-04-21T04:26:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"4d49c1d7-14e0-42eb-8b2a-46603b8e8b31"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T04:26:18Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 4d49c1d7-14e0-42eb-8b2a-46603b8e8b31 resourceVersion: "7842" uid: 715d0687-fac3-45c0-a585-8e25191beaae type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-20T04:26:11Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: ecadea0a-483d-44da-8a89-65b253490eac service.beta.openshift.io/expiry: "2028-04-20T04:26:11Z" creationTimestamp: "2026-04-21T04:26:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"ecadea0a-483d-44da-8a89-65b253490eac"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-21T04:26:12Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: ecadea0a-483d-44da-8a89-65b253490eac resourceVersion: "7730" uid: 53faf0ba-bc45-41fa-aa4b-b18377f4a041 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-21T04:20:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"36840008-ad02-48de-9477-3367d7c5f45e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-21T04:20:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-21T04:20:56Z" name: operator-dockercfg-vxs29 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 36840008-ad02-48de-9477-3367d7c5f45e resourceVersion: "4180" uid: 9ff0326e-cec0-4d88-87f5-6fed6f704a57 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27363"