--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T15:30:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8c46429f-3c19-42c2-b009-fbe734ab6b4b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:26Z" name: builder-dockercfg-sprmm namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 8c46429f-3c19-42c2-b009-fbe734ab6b4b resourceVersion: "21810" uid: 09c376d9-0455-4492-9351-db4f7337872d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T15:30:21Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c6a64a0d-a1c7-4cbc-b7b8-0aa348e0504e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:21Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:22Z" name: default-dockercfg-sqj66 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: c6a64a0d-a1c7-4cbc-b7b8-0aa348e0504e resourceVersion: "21691" uid: 22dd8f95-ee9c-4367-9906-a262219ec91f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T15:30:26Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b29e0037-b60b-4be5-9c94-d44f0c9ec577"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:26Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:26Z" name: deployer-dockercfg-t4fxt namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: b29e0037-b60b-4be5-9c94-d44f0c9ec577 resourceVersion: "21805" uid: 6dcefc29-76ff-458b-b6c4-c9ac4d9a52cd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T15:30:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cc3268a1-e6b4-4786-90d4-eb21cf1b3379"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:22Z" name: gather-dockercfg-6994r namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: cc3268a1-e6b4-4786-90d4-eb21cf1b3379 resourceVersion: "21693" uid: 3c67f7cf-07c9-4d2d-8bed-28591e00b216 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T15:30:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ae6bbad5-6782-4b39-90f5-a39759a92550"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:22Z" name: insights-runtime-extractor-sa-dockercfg-6mcjg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: ae6bbad5-6782-4b39-90f5-a39759a92550 resourceVersion: "21694" uid: 93924da7-8f1f-491b-ba0b-af71990d803a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T15:36:19Z" service.beta.openshift.io/expiry: "2028-04-21T15:36:19Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 5832a4ed-1422-4c38-938b-701dfd4bf903 creationTimestamp: "2026-04-22T15:36:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5832a4ed-1422-4c38-938b-701dfd4bf903"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:36:20Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 5832a4ed-1422-4c38-938b-701dfd4bf903 resourceVersion: "7537" uid: 5e5f0d19-2034-4d49-850a-2a9a390a3cd9 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T15:36:20Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 870ead1e-48c6-42db-a806-f2dc0e8dfbd3 service.beta.openshift.io/expiry: "2028-04-21T15:36:20Z" creationTimestamp: "2026-04-22T15:36:20Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"870ead1e-48c6-42db-a806-f2dc0e8dfbd3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:36:20Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 870ead1e-48c6-42db-a806-f2dc0e8dfbd3 resourceVersion: "7541" uid: 75698265-44cd-4948-9499-8eedff9306de type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T15:30:22Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"74e77d96-98e3-4f37-a5d7-7cedd8d38466"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:30:22Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T16:06:22Z" name: operator-dockercfg-wx2vb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 74e77d96-98e3-4f37-a5d7-7cedd8d38466 resourceVersion: "21678" uid: 3068df0d-ea03-404a-b009-0b561ca5d60f type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "29495"