--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T23:47:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"26a50eb0-7c12-4bab-ab05-0cc55fe674aa"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:47:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T00:23:07Z" name: builder-dockercfg-rzv8s namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 26a50eb0-7c12-4bab-ab05-0cc55fe674aa resourceVersion: "44888" uid: 76986696-624e-46b9-81af-d210c506f967 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T23:47:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8f76f26d-9786-4a87-a8f9-6ac49367391c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:47:02Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T00:23:03Z" name: default-dockercfg-kgv5j namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 8f76f26d-9786-4a87-a8f9-6ac49367391c resourceVersion: "44728" uid: 1462257d-ad9d-46ea-94dc-b0ce32eb5780 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T23:47:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2e9707c1-6c81-4606-bd81-ae866f7d737f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:47:07Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T00:23:08Z" name: deployer-dockercfg-dsxwp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2e9707c1-6c81-4606-bd81-ae866f7d737f resourceVersion: "44940" uid: 0bf0ad74-13ad-4874-b222-db3ef7c23ebb type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T23:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"661c9cf0-08b3-4959-8dac-1ee4b9151ba9"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T00:23:03Z" name: gather-dockercfg-9p4lw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 661c9cf0-08b3-4959-8dac-1ee4b9151ba9 resourceVersion: "44737" uid: 489b76f7-d5ce-4cc6-b121-9c540fb24964 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T23:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"44eddd17-2c02-42ff-8ddd-1ff7246ef540"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T00:23:03Z" name: insights-runtime-extractor-sa-dockercfg-kxrl6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 44eddd17-2c02-42ff-8ddd-1ff7246ef540 resourceVersion: "44730" uid: 46e47ccd-52ba-4fd3-af72-b790ae3c1b1a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T23:52:34Z" service.beta.openshift.io/expiry: "2028-04-15T23:52:34Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 0cd41946-cbe6-4ba2-9d5b-de5ffad0c69a creationTimestamp: "2026-04-16T23:52:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"0cd41946-cbe6-4ba2-9d5b-de5ffad0c69a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T23:52:35Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 0cd41946-cbe6-4ba2-9d5b-de5ffad0c69a resourceVersion: "7863" uid: e8878d37-cbf7-4f1b-8be5-6c27173ea321 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T23:52:28Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: d90d4579-edfd-4ba8-9354-e7a04d934ee9 service.beta.openshift.io/expiry: "2028-04-15T23:52:28Z" creationTimestamp: "2026-04-16T23:52:29Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"d90d4579-edfd-4ba8-9354-e7a04d934ee9"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T23:52:29Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: d90d4579-edfd-4ba8-9354-e7a04d934ee9 resourceVersion: "7696" uid: f1aecb3e-a1e7-45f7-ba61-db1e8da941ed type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T23:47:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0e511247-2253-4f3f-b8d1-a8f9d326e9b4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T23:47:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T00:23:03Z" name: operator-dockercfg-cmpnc namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 0e511247-2253-4f3f-b8d1-a8f9d326e9b4 resourceVersion: "44719" uid: aed0ccd2-0b34-497c-8bd4-7cf76729cb0b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46584"