--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T13:19:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"80bc3259-e46c-4ab0-9071-b9f6887d0c7e"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:54Z" name: builder-dockercfg-4nrpb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 80bc3259-e46c-4ab0-9071-b9f6887d0c7e resourceVersion: "22175" uid: ddcd6488-53bf-4b7c-9da8-69cc142e17e2 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T13:19:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8ff6bc25-d333-42b1-a1b2-99eeb1a43026"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:50Z" name: default-dockercfg-lqpj6 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 8ff6bc25-d333-42b1-a1b2-99eeb1a43026 resourceVersion: "22062" uid: 717b6fbf-5b74-47bb-9fcb-fb8b2ab6bd74 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T13:19:53Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8237d942-b74d-4396-91e1-ef4f7a5cb5ff"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:53Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:54Z" name: deployer-dockercfg-ck655 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 8237d942-b74d-4396-91e1-ef4f7a5cb5ff resourceVersion: "22178" uid: 2490e425-10d0-4872-ba01-195ecaddfaa0 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T13:19:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"f1dae422-69d3-41ae-a818-4bc9451695da"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:50Z" name: gather-dockercfg-vn6ff namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: f1dae422-69d3-41ae-a818-4bc9451695da resourceVersion: "22051" uid: db9176a8-e7f3-43e3-94ab-f160a216e3a1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T13:19:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5837a3aa-e92b-47e1-892d-99e30184f1fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:50Z" name: insights-runtime-extractor-sa-dockercfg-jvn9v namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 5837a3aa-e92b-47e1-892d-99e30184f1fd resourceVersion: "22066" uid: 814b33f5-6d22-40c4-8ca4-3a575634a02b type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T13:21:51Z" service.beta.openshift.io/expiry: "2028-04-21T13:21:51Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 3b61a419-8d57-44ec-9cfd-0ee434fc4dda creationTimestamp: "2026-04-22T13:21:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"3b61a419-8d57-44ec-9cfd-0ee434fc4dda"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T13:21:52Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 3b61a419-8d57-44ec-9cfd-0ee434fc4dda resourceVersion: "6620" uid: 2c57dffd-9340-4630-a2fa-7facbff71896 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJRUNNeW9ZVmdWMGN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzJOREV3TXpBZQpGdzB5TmpBME1qSXhNekl4TlRCYUZ3MHlPREEwTWpFeE16SXhOVEZhTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQU1EY0lqR1dIK2ZFTmI2ejBrSmRNQXdqeHdkNVdETzQ1UWpRaVdwdExOS05EUFpGWksrVgpwY2FHRjZKRFVBMGxhQlBpVkpxbml0bjVQZFpTVVdDRk9TMHFESW9Ub3dlR3FBc2xlYzVUbG05SVNNU01wSS9nClpmS1ByeFBpcmZsejVtMTRpQnpkRzdTNDAzQkxuMXdQa1VUMkVreWJ3NDZ1M1NBYTJJYWdyQjFibXQ4TUpOdDQKMENvamwyNFlMUFgyODFQdXNaSWNqblhQaXRPcWp5SnhzUnFYQkwrU3FSVTM0Uko3NW5kMS9lcXhNUE9jR2hEVgpJaU5weGI2VkcyMWc1R09nSVBRLzhWdFZSTDRUS04ySDhUR2ROMHdob0VwOFZES3hoYkZJZGFSdHQvTktncUNoCnpuZE14bVE3clhGYmtjQTFqR215ZXYxTXFNalFncmlsSFRFQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJTb25NS1U0LzBNU0tUUCthU016RnZxTDR6M1d6QWZCZ05WSFNNRUdEQVdnQlRVRUNRdmxSVllGRkN3Ckk4SXlhZG94cksyVG5UQlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkRabVpHVTRNakkwTFRWa09HUXRORFV6TWkwNE5EQTFMVEZoCk4yWXpNR016WTJGa1pqQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFiOThkc2g4L2w2UkJESzdUUFNUNVV3TjMKN2E3dmhtQVRyUnR1T0JEVVo2bkZoZFp0S1ByMG1LZkhRRUZ2M2pGR0dGY2lRb3hOM0N3dE5lMjcxaXpMRHFiTwpGR2FvTlIvc3NRVWhUNmNtb1RmZTYvUGlaQStDdHVRVG9HRHNHdHI2WU50MFlTV051NWpnMy84YUtQYldPbHI3CnMrcnlXc0NXVUt4SmcybTdGOEw0dzhCV29oTkYxcndaS1ljM00zNVUvMlIrc01wZGlWVFgzNHAwK2FkUkFnM00KUVR1ZkFIcUFOVUJGL0l4VTQ2MlpkTUpwL2Z3QldhY08vWnVsWUVnN0MyeGlvQzl3a1pGTUNFQWs0VSsyL0hIdQo2U3A5eFVlTzlCOHJHV2RITVBNQjRhVFhjZjJpbmwwNS9lb3JGNVVjKzhMNlhnKzQyeFN6L29uc0ZGeVptZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJTy9GYzlQMUZwWkF3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzJOREV3TXpBZQpGdzB5TmpBME1qSXhNekl4TkRKYUZ3MHlPREEyTWpBeE16SXhORE5hTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelk0TmpReE1ETXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRRFB4MlVmeWxJSGlGRS9XWENlbTBGcVRkemJHRzN0T3E2bQpWMzJGYlUvVlpWb1d4d0lSdVFMc25ZeVM4Y1RjRGl0cHNRM3F5ZFB5QTJWdkltaTQ4M2hjMG8zOUUzQU91a1NBCldMczFwQitPQllnMkRlUzJVVERVdVFuSDlBeXRoeEdVM095cWdZVEJ6M01PdEd3TEhDOGYyQnJkY2prZkxzTSsKWHRKNTNmWWdqL1BudStuUm9Cb0lXZysrRlJVQkh5clplSDEvdlVGaG9rRXZ0aHNXbmV3MlFreWhXOWpPYjFzSApjL2tHVm5HMnVGUlhYdDFnbVY0OCtWYUpHTHdMTkFEaGRoY1J4aklxdFh1eHVvZDFvZndqT0J4eTNpMGhzYjBEClhhNlRUbHUrT0daZFNyMjVBM2lKamRHdWJUY3lhOGFSZUdTQ0pwM3lDeFFKajVoaElLZWxBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlRVRUNRdgpsUlZZRkZDd0k4SXlhZG94cksyVG5UQWZCZ05WSFNNRUdEQVdnQlRVRUNRdmxSVllGRkN3SThJeWFkb3hySzJUCm5UQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFpbkNJUi9UUmZyL0g3MkphdGJmUVRMaDdtdnd6NUp5WFNQUWIKeDhGM2EvYWs2cmVrTG5yMldVTk44RkZ3SVNVaFNoREQzWHpuSWd4NnI3TWFtU3BmMkd0WW9aRk5Lc1k1aU9wegpmRG5vU2RlaDY3Uy9tZW9xc3RvU29NTUFrdFcxb05Ob0oycEtPYWZaZXl3K0h6dmgyOXNnNlR4dDY3KzF4TDNKCityRmtLSmZKN0k4L0Y4OHgya0xkQmhqZktSQ09pWUsxMml0UmlDd0NueXBBQnNTNlUrMFNOMTBQcVFVQkc2TGEKOWNCSkR2SkJpaGRFcEp4VlpUUGIxR1l2Y2NOWlpIK0haVmNQWWMrRzVLc3l1TTN2bER0ejltM1haTGF6TnlreQpKUUplSUxDRnFQclY2bWtna1FCaEZOL0wzejRpRytoZzJnYklKS0lIQUczdCtVQ2trZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T13:21:51Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 6fde8224-5d8d-4532-8405-1a7f30c3cadf service.beta.openshift.io/expiry: "2028-04-21T13:21:51Z" creationTimestamp: "2026-04-22T13:21:52Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"6fde8224-5d8d-4532-8405-1a7f30c3cadf"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T13:21:52Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 6fde8224-5d8d-4532-8405-1a7f30c3cadf resourceVersion: "6629" uid: ae3f034a-8991-4b1d-9d2e-3517167e8763 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T13:19:49Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"924dce15-930c-4255-85af-43cce3ae768c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T13:19:49Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T13:55:50Z" name: operator-dockercfg-gff5c namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 924dce15-930c-4255-85af-43cce3ae768c resourceVersion: "22052" uid: 6c7faeb8-b113-495c-ba92-c58c784fee59 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27142"