--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T08:29:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"506b7960-f025-4123-86d9-04d7289f69d6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:56Z" name: builder-dockercfg-sc4n2 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 506b7960-f025-4123-86d9-04d7289f69d6 resourceVersion: "16280" uid: 55f11d8c-5590-4a30-b9f1-f59fc516ee53 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T08:29:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c205526a-f17f-4fac-bfd9-5776ba28c051"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:53Z" name: default-dockercfg-khzgx namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c205526a-f17f-4fac-bfd9-5776ba28c051 resourceVersion: "16131" uid: 2cbf6aa6-7a87-4c2d-ad65-f73edf948a4d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T08:29:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"76472e41-3512-4fa3-a224-e4c28b478ca0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:56Z" name: deployer-dockercfg-vt2sm namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 76472e41-3512-4fa3-a224-e4c28b478ca0 resourceVersion: "16284" uid: 87bc3806-7ad0-4e75-ad93-0d45ca0b9d45 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T08:29:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"971aeaeb-a497-4033-b541-d68560bbfe85"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:53Z" name: gather-dockercfg-hs62d namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 971aeaeb-a497-4033-b541-d68560bbfe85 resourceVersion: "16136" uid: 125790b3-5ed6-47c8-a7eb-dc954dd5152a type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T08:29:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7da6d3e0-6153-4c98-ac49-f6782d9d7e8b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:53Z" name: insights-runtime-extractor-sa-dockercfg-rqvkt namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 7da6d3e0-6153-4c98-ac49-f6782d9d7e8b resourceVersion: "16135" uid: 62914ce5-ea4e-47bf-b4ed-73067c78fdf6 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJQ290R2FqUkluK0F3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTXlPRFV5TVRBZQpGdzB5TmpBME1UWXdPRE0xTXpWYUZ3MHlPREEwTVRVd09ETTFNelphTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFOa3Z4aXBmSXhGQlpTYmJ6Q0k5UUtydExOanJZL2Z3bGszWStlQ2hjRnNlelBYUwovTmpZdjg3TEJlZXp4U1MvbXcvNzJDY21NSFpqUkllZTVYOVg5b29lUnhzVVFWakJCUHRuZjJuZlBEVFhTZ0hrCjBTSDRSNVZnckIzT25mK3krYUFjb3lRMnhHSHE0WElPbnl2R3oxUUZ3TXNOY0tRYjVtQlZUMTZ0cWtUcGJrSDEKREpvSmc2ekljUFlRVFdXZzdZZnN3Y0JNU080ZUk5R3RNekhjUnBMbHZ3SXNMYmdMRStlQ3FQRE10OXlUY0pkYwpVb3V5ZktGTGd6RlFDVE5aamxEc3hUbEkyYTB1Wi9sQUI4RkNCQlZZY2llc0RwdWVtY2M5TVhleUJJZ3liQWNvCmVuVmVSUXMzcjcwVkNKOUp2OWdFU0JKQWxIbjV5WnBEK3h4NDdBVUNBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCVGl6SkV2b0Y4NTdEK3VzQTdRWVRweFg1RzdKekFmQmdOVkhTTUVHREFXZ0JUaTJ6dDUyaVhnCkFYTms1elJqYTdXZWpRajVnRENCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rTVRRd1ltTmpNREF0WmpBeU5TMDBOamM0TFRoak5tSXRaREV4WlRnegpNekE0WkRFM01BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQVYvek1lb2I1OVVza2ttbExJQjZvQXBKYTBsZEFQClRON1lCb0pzTEpGblBsTjkvMzQyYld0ejBsT3duSUVSVGVIeUJ6cXUrZ1J0NUJKcWZpazRJUVptVE0zZ3l3dzkKUW5FTVFXamxNbWlpZlZjbm9HK1ZmUUN1d1lPRE9tMmUzcGk5UERDL29wc002RGdudnpXR29XRFgwb2toMVhkcwpENUtEdFQrTzNmZTJDRHpQV1J1WXhNeStDWVZHUFNPY1kxa2s4VUVsYXJGSG9FRWtDT08ydVJwRWFIUUtvTzM0ClNxSzViL042SWpPeExpTEI5MW5XUFhFeVpHazJiVDFDbkdpclJvbGtjZFA5UDArUGtKUzF6K0hHc0JOVTdJZGEKTEUrcUh4WFVuMTE0cGV5czNQc0dGemt6UXpiUHVOQktsZFI2TnhKYnI5SUxSbG9ZZEVicXBSUGkKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlWdVJLMXVCbHQyd3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpNeU9EVXlNVEFlCkZ3MHlOakEwTVRZd09ETTFNakJhRncweU9EQTJNVFF3T0RNMU1qRmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WXpNamcxTWpFd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFDcy9SeU90aHEwckxnOVBuZjRIdU1Wd3pUUCs3MzZ1czBLClUwcGluWUNJRzRWWUhkTWhRdHR1ek5kcVRrT3JZTllMVngxczUycExsYUZYVE5ZV0dwVWVkRDNnMm9wMmJ2ZHEKVVNBMzhnUmJGQjBkeTk2ZnRWYXV0U3M5NThDZ1RiSHNvcGxzcTduRURYdHRyV0l6bGhnbUhkTWxBUkNUMS9rMwpxeWV3ZTdWdzhhNVRwU2dzVkVnOTJkdUIrblBGb0RobHdOQk9teGp4YWlzTTQxMk10bk9xem9pWjJHNlNMNldLCnJDUVorbjN4b2x0T3hBMEIrYUwrSk4xb3dKai9NVHdtTlRja25mSzZGSFA3WGxUa0RCZ1k2OHE4aGYvb1N0blQKRkJyYVNQVFQrTkJabWNLY1FiRkw2M0VsRm1aU0ZtMkNLQ1YvQzVaRGQwdXVPbzZuR1BPcEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCVGkyenQ1CjJpWGdBWE5rNXpSamE3V2VqUWo1Z0RBZkJnTlZIU01FR0RBV2dCVGkyenQ1MmlYZ0FYTms1elJqYTdXZWpRajUKZ0RBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQVY0ZGsyM2dTcFA5R2M2UDlsTnVmVElPeDZacE85ZXEwZnNtMApNZ0NUL0p5d2FYWkdmYmFPZ21QSUZ5VHNMOHdHS3V6MDYzU3BqcGJpSjFZWjNxRUhlZGxEWUxId3Q5di9YNDFmCmUvZjVCYkZibFFGVjRyb1lJZDhIRDliZ2J5ZCs2N1R5Z2dXbHRCeFhtV2ZINWlGNllLSmZ2YzlUa0FNZ1pBRy8KVFo1a3pvaXZxTys2cXdrWWZwb1VBdHU0a3pYVnVMYmYySkg0djlQNW9CR2liQ05IaXIyYzBOSVBSVEg3TlRIMApUWUpQS2ZrN3FHZjQraUd1SjBWOVRkbFJKSmRPNUhsUWpXUS92ODhPMWwvNTNGazgxNk9nS1hrY283TTNZM2l4Ckh0WHNsU1UvbmZ4SlNSWFR2Q1lEUFQ4Q0x6VHBKTllwVDFQelRkb05PVEV1cVgwNlN3PT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T08:35:36Z" service.beta.openshift.io/expiry: "2028-04-15T08:35:36Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 140bcc00-f025-4678-8c6b-d11e83308d17 creationTimestamp: "2026-04-16T08:35:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"140bcc00-f025-4678-8c6b-d11e83308d17"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T08:35:37Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 140bcc00-f025-4678-8c6b-d11e83308d17 resourceVersion: "6673" uid: 5c83694a-de06-4e73-900b-312e835619a5 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJVG5scGgxSnpTeDh3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTXlPRFV5TVRBZQpGdzB5TmpBME1UWXdPRE0xTWpsYUZ3MHlPREEwTVRVd09ETTFNekJhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQU9oZzNJMFRXcUNyT1laT1VadXlhZ0gvemV6cEQweU1INkxuZnM3amNPM3MzYnBvc0NaWgo4QndVZ0xGV1laY28wSlJqeEVIWGNQUldVbkdBL2pPQVljaDRHNk1nditrMElOVnIzSi8xTTZHU05vVmpVdG9iCjVDVmhUY0JhWGFCSTQ0cUVGeVNkdVJJbXh4TU00cnorME94dGkzWUhPWm1uY3Q5RVF5aXdBWnJGcWIySkEzVHEKOEpHNGxpQ1huOSs4Q2x4a3ZlYVlFM1pPUHBGQXNZZ0pwTHFYQzRFTHpUNUh5S25EQjhQUmFTdUhWc1VPVitNOApPVlRTaVZwZWhtT01UUk1ONk94dFplT1VkbjdYTXJUTEZwZm9qaHFDZC8yZEFDdEFtRGNMTURpNVpMVUpsMjRtCkR2cnMvdUFyYXBTSXRzSmR1ZDZRM0lNZExpSDBpcGJyVGRVQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJRSkUrN0o5UWl5K2I0Q2VueS91LytqenVQRDdUQWZCZ05WSFNNRUdEQVdnQlRpMnp0NTJpWGdBWE5rCjV6UmphN1dlalFqNWdEQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkRnME5qRTRORFJsTFRFME5tRXROR0kwWlMwNE5qazRMV0psCk5UWmxPVFEwT0dGa05EQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFoTGtvc3E5ZjdNS1VZQlZpdG1QVlhwQkUKeUNwTENRcTBiZVhFODhuc3dMekE4MXFlQXdpOXdwSWd1cTEwcitUMXpjK041d1Y5aTUyVTRjNWZmaFVUd1cwOQo2bDlZSTJKczlTL0ZUSU9YUmZ3WENCMUM2UWU5YnowOW5xc2R1MWxVMGpPWThPNzY3dE0wMkMrejdQbVdqTDE3Ci9wOXV1bXp1RjFodDYrUENYUCt2bWF1ZFNNaWZZR3djcnhscitTRHZKMlZSNXZTRjRyWEN0MnQ2K1FoKzdJU1oKUnA3L0JIU2YzN0VlQTRDbkt2dnR6ZVVrSllrWWNCTG1pNE5zaE0yYms5RUhaUnZkSXpIUzRxamZkNytGMGFBVwovV0M5TDVuUlNtQWFCTjVOTVNLdHg1UklnTHh4S3V2QjhLMDR6cXYxMjFwUTFFNG1Na1RsNlRsZFMzdDkyQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJVnVSSzF1Qmx0Mnd3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qTXlPRFV5TVRBZQpGdzB5TmpBME1UWXdPRE0xTWpCYUZ3MHlPREEyTVRRd09ETTFNakZhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOell6TWpnMU1qRXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQ3MvUnlPdGhxMHJMZzlQbmY0SHVNVnd6VFArNzM2dXMwSwpVMHBpbllDSUc0VllIZE1oUXR0dXpOZHFUa09yWU5ZTFZ4MXM1MnBMbGFGWFROWVdHcFVlZEQzZzJvcDJidmRxClVTQTM4Z1JiRkIwZHk5NmZ0VmF1dFNzOTU4Q2dUYkhzb3Bsc3E3bkVEWHR0cldJemxoZ21IZE1sQVJDVDEvazMKcXlld2U3Vnc4YTVUcFNnc1ZFZzkyZHVCK25QRm9EaGx3TkJPbXhqeGFpc000MTJNdG5PcXpvaVoyRzZTTDZXSwpyQ1FaK24zeG9sdE94QTBCK2FMK0pOMW93SmovTVR3bU5UY2tuZks2RkhQN1hsVGtEQmdZNjhxOGhmL29TdG5UCkZCcmFTUFRUK05CWm1jS2NRYkZMNjNFbEZtWlNGbTJDS0NWL0M1WkRkMHV1T282bkdQT3BBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlRpMnp0NQoyaVhnQVhOazV6UmphN1dlalFqNWdEQWZCZ05WSFNNRUdEQVdnQlRpMnp0NTJpWGdBWE5rNXpSamE3V2VqUWo1CmdEQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFWNGRrMjNnU3BQOUdjNlA5bE51ZlRJT3g2WnBPOWVxMGZzbTAKTWdDVC9KeXdhWFpHZmJhT2dtUElGeVRzTDh3R0t1ejA2M1NwanBiaUoxWVozcUVIZWRsRFlMSHd0OXYvWDQxZgplL2Y1QmJGYmxRRlY0cm9ZSWQ4SEQ5YmdieWQrNjdUeWdnV2x0QnhYbVdmSDVpRjZZS0pmdmM5VGtBTWdaQUcvClRaNWt6b2l2cU8rNnF3a1lmcG9VQXR1NGt6WFZ1TGJmMkpINHY5UDVvQkdpYkNOSGlyMmMwTklQUlRIN05USDAKVFlKUEtmazdxR2Y0K2lHdUowVjlUZGxSSkpkTzVIbFFqV1Evdjg4TzFsLzUzRms4MTZPZ0tYa2NvN00zWTNpeApIdFhzbFNVL25meEpTUlhUdkNZRFBUOENMelRwSk5ZcFQxUHpUZG9OT1RFdXFYMDZTdz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T08:35:30Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 8461844e-146a-4b4e-8698-be56e9448ad4 service.beta.openshift.io/expiry: "2028-04-15T08:35:30Z" creationTimestamp: "2026-04-16T08:35:31Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8461844e-146a-4b4e-8698-be56e9448ad4"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T08:35:31Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 8461844e-146a-4b4e-8698-be56e9448ad4 resourceVersion: "6552" uid: c19730bd-661f-48a0-b2f3-412852a4e0ff type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T08:29:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5fa9a17b-d0e3-4404-8605-7b13b5539e56"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T08:29:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T09:05:53Z" name: operator-dockercfg-845ml namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 5fa9a17b-d0e3-4404-8605-7b13b5539e56 resourceVersion: "16141" uid: a1b42af0-45c4-45ea-bb95-9d909653581c type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "17918"