--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T14:04:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"bbf1ca7a-7f6c-4281-9a51-9777b76ca3eb"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:04:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:06Z" name: builder-dockercfg-dndvh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: bbf1ca7a-7f6c-4281-9a51-9777b76ca3eb resourceVersion: "22176" uid: 587e5d37-f286-4310-bef5-88c845ff205e type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T14:03:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fba7f293-2d1b-488b-824e-ae0d4235f542"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:03:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:03Z" name: default-dockercfg-w5zvq namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: fba7f293-2d1b-488b-824e-ae0d4235f542 resourceVersion: "22002" uid: 1852ffe9-d316-4b63-81d8-b12821c18b90 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T14:04:04Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c0d20e24-2a29-43fd-9118-5f741621d940"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:04:04Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:06Z" name: deployer-dockercfg-djd5n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: c0d20e24-2a29-43fd-9118-5f741621d940 resourceVersion: "22170" uid: ad3064fe-d5d7-42a9-9fe4-ccf50d1e7598 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T14:03:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fd6ba09c-9acb-4a63-ade0-5cb08e29ef5a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:03:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:03Z" name: gather-dockercfg-rxhv6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: fd6ba09c-9acb-4a63-ade0-5cb08e29ef5a resourceVersion: "22017" uid: f8790c07-234a-40e9-b765-7eb8f962d1dc type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T14:03:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"38695ba5-61a4-4392-b179-5889bf006be8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:03:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:03Z" name: insights-runtime-extractor-sa-dockercfg-cl66l namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 38695ba5-61a4-4392-b179-5889bf006be8 resourceVersion: "22019" uid: 98193722-5e40-4079-a702-5f89dba9351a type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:09:35Z" service.beta.openshift.io/expiry: "2028-04-16T14:09:35Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 1272ae1c-fdf8-405d-bb81-72a62949fb9c creationTimestamp: "2026-04-17T14:09:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"1272ae1c-fdf8-405d-bb81-72a62949fb9c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:09:36Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 1272ae1c-fdf8-405d-bb81-72a62949fb9c resourceVersion: "7756" uid: f99ce60e-d944-4528-9b23-498679e64d2d type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T14:09:36Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: fe7fa0ab-252d-4376-b63d-ced2a48bbafd service.beta.openshift.io/expiry: "2028-04-16T14:09:36Z" creationTimestamp: "2026-04-17T14:09:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"fe7fa0ab-252d-4376-b63d-ced2a48bbafd"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T14:09:37Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: fe7fa0ab-252d-4376-b63d-ced2a48bbafd resourceVersion: "7763" uid: d64b148f-cf10-412c-a70e-3ad6441fa0f9 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T14:03:59Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9dbdc5c3-3a36-40fe-af18-c7058f16438f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T14:03:59Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T14:40:03Z" name: operator-dockercfg-v5nhj namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 9dbdc5c3-3a36-40fe-af18-c7058f16438f resourceVersion: "22007" uid: f7affc40-80aa-479a-9ef2-50aaa163dc80 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "28177"