--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T14:22:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"31d80a21-d39a-4bb0-86ae-11743ae71a2a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:37Z" name: builder-dockercfg-8ptpg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 31d80a21-d39a-4bb0-86ae-11743ae71a2a resourceVersion: "21826" uid: cc8f7d2e-534d-4ffd-a423-f43905d9cc21 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T14:22:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"1f8e6617-7c75-41db-be6a-a3732a1f7e8c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:33Z" name: default-dockercfg-4hnkz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 1f8e6617-7c75-41db-be6a-a3732a1f7e8c resourceVersion: "21701" uid: 9079cea0-66aa-4100-9fd2-1cd2257112b5 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T14:22:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"407777fe-44f3-4a89-9bb1-6eabe010a223"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:37Z" name: deployer-dockercfg-hg579 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 407777fe-44f3-4a89-9bb1-6eabe010a223 resourceVersion: "21842" uid: d4625bdc-eb23-4f0e-b98c-8af19209310f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T14:22:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"06e16ec9-84aa-4af6-bbfe-b0781aa5805c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:33Z" name: gather-dockercfg-ftbqp namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 06e16ec9-84aa-4af6-bbfe-b0781aa5805c resourceVersion: "21713" uid: 5190bf76-e699-4731-9b74-b0412cb119a6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T14:22:32Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"843e7ad7-c636-4f18-bbcb-65f2c51c3f6b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:32Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:33Z" name: insights-runtime-extractor-sa-dockercfg-wp7x7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 843e7ad7-c636-4f18-bbcb-65f2c51c3f6b resourceVersion: "21698" uid: 5b68b844-d1f3-4304-87cc-8c5b6423a88f type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:28:18Z" service.beta.openshift.io/expiry: "2028-04-16T14:28:18Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 634409f2-f1fb-477d-a3cb-91822223227e creationTimestamp: "2026-04-17T14:28:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"634409f2-f1fb-477d-a3cb-91822223227e"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:28:18Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 634409f2-f1fb-477d-a3cb-91822223227e resourceVersion: "7843" uid: 8ccba1f6-07df-49f4-8ae6-449e62fcf19f type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:28:12Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 0671abaf-5361-495e-a121-dffd981ce93c service.beta.openshift.io/expiry: "2028-04-16T14:28:12Z" creationTimestamp: "2026-04-17T14:28:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0671abaf-5361-495e-a121-dffd981ce93c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:28:13Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 0671abaf-5361-495e-a121-dffd981ce93c resourceVersion: "7717" uid: 9c3115e8-e4e3-495f-89d1-16ab8eebc688 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T14:22:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7d6b18ee-9f32-4690-8158-d0327d2daa1d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:22:33Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:58:33Z" name: operator-dockercfg-99r8n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 7d6b18ee-9f32-4690-8158-d0327d2daa1d resourceVersion: "21702" uid: 855a867e-5c01-428f-85c4-ea26a6b13e68 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "24821"