--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-20T17:44:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"93aff0be-17c8-4efb-a51a-3d2320ce985e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:52Z" name: builder-dockercfg-t52nf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 93aff0be-17c8-4efb-a51a-3d2320ce985e resourceVersion: "3902" uid: 0597ca25-e4b5-4271-bee2-b486bfabd88a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-20T17:44:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"61995ef7-a969-42f1-bbc1-2730c7f55b86"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:48Z" name: default-dockercfg-dvsw8 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 61995ef7-a969-42f1-bbc1-2730c7f55b86 resourceVersion: "3395" uid: bf696b46-094f-4a18-b959-540937f4f2e4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-20T17:44:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:52Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"aac6b003-c5b7-417c-a7a1-4f5656635699"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:52Z" name: deployer-dockercfg-nmxg6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: aac6b003-c5b7-417c-a7a1-4f5656635699 resourceVersion: "3907" uid: 564dbd3e-68d3-4d2b-957c-4a06ed5e9963 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-20T17:44:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5d66ee72-e749-429f-b499-c4b101e24450"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:48Z" name: gather-dockercfg-ns945 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 5d66ee72-e749-429f-b499-c4b101e24450 resourceVersion: "3401" uid: f64bdb12-bdcf-4209-96f2-d8fca2034bdc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-20T17:44:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6d94ba3f-0f1e-4f45-bbf9-fda7e4bc66e0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:48Z" name: insights-runtime-extractor-sa-dockercfg-lvbdx namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 6d94ba3f-0f1e-4f45-bbf9-fda7e4bc66e0 resourceVersion: "3413" uid: 8e2b9915-0cc7-4bb3-90af-0ab12938acd1 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T17:51:00Z" service.beta.openshift.io/expiry: "2028-04-19T17:51:00Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 0d02a239-95a0-4c90-81d4-9891b26c4a8a creationTimestamp: "2026-04-20T17:51:00Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"0d02a239-95a0-4c90-81d4-9891b26c4a8a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T17:51:00Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 0d02a239-95a0-4c90-81d4-9891b26c4a8a resourceVersion: "8052" uid: c236ebed-6d45-428e-8c98-fda345459c22 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-19T17:50:54Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: f55dfd81-34c7-4c07-a0fe-1f6968b51b08 service.beta.openshift.io/expiry: "2028-04-19T17:50:54Z" creationTimestamp: "2026-04-20T17:50:54Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"f55dfd81-34c7-4c07-a0fe-1f6968b51b08"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-20T17:50:54Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: f55dfd81-34c7-4c07-a0fe-1f6968b51b08 resourceVersion: "7931" uid: a7768e65-861a-46ea-b386-d1869e320cad type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-20T17:44:48Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-20T17:44:48Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8f4a071d-1dc7-49cd-981a-6a594891533e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-20T17:44:48Z" name: operator-dockercfg-pjdzw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 8f4a071d-1dc7-49cd-981a-6a594891533e resourceVersion: "3415" uid: 9928dfdd-b53a-46cf-9d23-9afde5324514 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27200"