--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T14:54:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e558d024-e091-4f82-9c64-72919075bf91"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T14:54:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T15:30:04Z" name: builder-dockercfg-zhj4c namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: e558d024-e091-4f82-9c64-72919075bf91 resourceVersion: "21893" uid: f2de4c83-ca38-449d-aff2-bd2f3da4b595 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T14:53:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"2f1699df-8910-48d4-aecb-96ec22ba6d4f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T14:53:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T15:29:59Z" name: default-dockercfg-lcmnf namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 2f1699df-8910-48d4-aecb-96ec22ba6d4f resourceVersion: "21738" uid: a7767cd1-2d26-4341-a9de-f6397ee11247 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T14:54:03Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"57f5ccf7-5cc0-4b01-8a69-8812eb4b97e1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T14:54:03Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T15:30:04Z" name: deployer-dockercfg-r8mjb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 57f5ccf7-5cc0-4b01-8a69-8812eb4b97e1 resourceVersion: "21877" uid: f150dc32-8990-460d-8a0d-d60b72927d3d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-23T14:53:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"3555fc44-f148-4bd2-9070-a632d3a74c89"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T14:53:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T15:29:59Z" name: gather-dockercfg-fqb94 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 3555fc44-f148-4bd2-9070-a632d3a74c89 resourceVersion: "21730" uid: 07e6417e-6930-4b97-9076-613e73420790 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-23T14:53:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1247e282-7814-41d7-b988-aed7f42ad6e7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T14:53:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T15:29:59Z" name: insights-runtime-extractor-sa-dockercfg-4ln87 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 1247e282-7814-41d7-b988-aed7f42ad6e7 resourceVersion: "21733" uid: 1e1ee074-b696-4045-a6fd-73ce7655d4b6 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T14:58:11Z" service.beta.openshift.io/expiry: "2028-04-22T14:58:11Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 53e0c6c6-d069-4657-8afa-5ff37b97bf82 creationTimestamp: "2026-04-23T14:58:11Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"53e0c6c6-d069-4657-8afa-5ff37b97bf82"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T14:58:11Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 53e0c6c6-d069-4657-8afa-5ff37b97bf82 resourceVersion: "8074" uid: 7e5b9374-9044-42e6-9973-8784d0ef3aba type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T14:57:40Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 741ee234-6cd1-4e74-b191-41058d633340 service.beta.openshift.io/expiry: "2028-04-22T14:57:40Z" creationTimestamp: "2026-04-23T14:57:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"741ee234-6cd1-4e74-b191-41058d633340"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T14:57:41Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 741ee234-6cd1-4e74-b191-41058d633340 resourceVersion: "6668" uid: bf0f7013-382f-407a-989a-9446807bd59f type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-23T14:53:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bb03e16f-a6a1-46b6-bcef-d2929db80ecd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T14:53:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T15:29:59Z" name: operator-dockercfg-z79td namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: bb03e16f-a6a1-46b6-bcef-d2929db80ecd resourceVersion: "21723" uid: 3575022b-6fbd-4e9f-b121-560bc2345698 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "28389"