--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-05-11T20:47:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"50f41047-3f55-42d4-85ef-ee29afcb816f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:09Z" name: builder-dockercfg-z9tcx namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 50f41047-3f55-42d4-85ef-ee29afcb816f resourceVersion: "45332" uid: 1bd1e347-b9fa-44cd-8ca6-b230cea89765 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-05-11T20:47:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"efefceaa-e0e8-40a7-a480-4e724535cb18"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:04Z" name: default-dockercfg-jsnzg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: efefceaa-e0e8-40a7-a480-4e724535cb18 resourceVersion: "45126" uid: 2d32086b-ab18-476d-a48c-2dfa06db8ea4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-05-11T20:47:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2c3dc977-61cf-430b-b93e-ead5b6a155a4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:09Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:09Z" name: deployer-dockercfg-hvckk namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 2c3dc977-61cf-430b-b93e-ead5b6a155a4 resourceVersion: "45327" uid: 35f92e54-e6df-4cb1-bb53-0583cd471ae0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-05-11T20:47:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9991d67c-1295-47a9-b9ff-4cb0c760b0c5"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:04Z" name: gather-dockercfg-c6nd8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 9991d67c-1295-47a9-b9ff-4cb0c760b0c5 resourceVersion: "45145" uid: 655f7082-6cfb-40ea-bcfc-659accd9c638 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-05-11T20:47:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1b2a55fe-c697-42af-8040-fbfb4bf17986"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:04Z" name: insights-runtime-extractor-sa-dockercfg-s999c namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 1b2a55fe-c697-42af-8040-fbfb4bf17986 resourceVersion: "45136" uid: 272d822a-e153-4ee7-9faf-3151487377fc type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-05-10T20:51:17Z" service.beta.openshift.io/expiry: "2028-05-10T20:51:17Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 69cc3736-ef86-4ebc-8134-4e74795f0893 creationTimestamp: "2026-05-11T20:51:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"69cc3736-ef86-4ebc-8134-4e74795f0893"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-05-11T20:51:18Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 69cc3736-ef86-4ebc-8134-4e74795f0893 resourceVersion: "7351" uid: aa0e64b5-115c-48f0-83ce-2b38e10c14b0 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-05-10T20:51:11Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 3aec2fcc-a827-4ddf-9dbf-39543fc4204e service.beta.openshift.io/expiry: "2028-05-10T20:51:11Z" creationTimestamp: "2026-05-11T20:51:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"3aec2fcc-a827-4ddf-9dbf-39543fc4204e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-05-11T20:51:12Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 3aec2fcc-a827-4ddf-9dbf-39543fc4204e resourceVersion: "7168" uid: 1f2d659e-da90-43db-8785-867b888a1c81 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-05-11T20:47:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4746a5e8-b71f-45c8-8ac2-4fc78465c374"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-05-11T20:47:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-05-11T21:23:04Z" name: operator-dockercfg-bwhrj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 4746a5e8-b71f-45c8-8ac2-4fc78465c374 resourceVersion: "45141" uid: e40b29c2-3867-4ef1-82bb-b0f35d1df05a type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "46254"