--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-22T15:05:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d3519d74-e3e7-4428-b8a1-75595be6c64d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:35Z" name: builder-dockercfg-6wk6w namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: d3519d74-e3e7-4428-b8a1-75595be6c64d resourceVersion: "22412" uid: af019efa-64f2-4b4c-9116-19e120817d4f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-22T15:05:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b7cb6a1d-3e66-4005-a9d9-b5c420aafd42"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:30Z" name: default-dockercfg-v27xq namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b7cb6a1d-3e66-4005-a9d9-b5c420aafd42 resourceVersion: "22269" uid: 64803783-3fd2-4e13-85c4-64f3b4fd55c7 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-22T15:05:35Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4d8fa7ee-e720-41a0-958c-24696f6d688a"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:35Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:35Z" name: deployer-dockercfg-qjc8k namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 4d8fa7ee-e720-41a0-958c-24696f6d688a resourceVersion: "22415" uid: 00a3205e-7ddc-4b81-9402-d1d5be1ce7b6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-22T15:05:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a1683c19-24d8-4943-a199-6542ed778376"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:30Z" name: gather-dockercfg-jkmx4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: a1683c19-24d8-4943-a199-6542ed778376 resourceVersion: "22263" uid: d64e6dc2-e87e-4705-a21d-3b8ca3110452 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-22T15:05:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b2b4022e-d02f-4a4f-9e1c-b3960f21fa28"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:30Z" name: insights-runtime-extractor-sa-dockercfg-dmx2q namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: b2b4022e-d02f-4a4f-9e1c-b3960f21fa28 resourceVersion: "22258" uid: 0edc4a92-0fe4-4e7d-9464-1241463bddfc type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVSakNDQXk2Z0F3SUJBZ0lJTGllM0ZxWXJsU1l3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qZzNNRFV3TnpBZQpGdzB5TmpBME1qSXhOVEE0TXpSYUZ3MHlPREEwTWpFeE5UQTRNelZhTUN3eEtqQW9CZ05WQkFNTUlTb3VaWGh3CmIzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMll6Q0NBU0l3RFFZSktvWklodmNOQVFFQkJRQUQKZ2dFUEFEQ0NBUW9DZ2dFQkFMbVk1eDNuYTlBQ1VoTlp3bW1uVFlvS0IrMlZQY2hLTndJR3hTdDFlaElvVm5vTQpsT0JuZDk1WUdxbCtGcUFVWVBkcjk5elBSWVdZODBpNEpLcE9XTnVjMk1KUFptT2k0bHFQZmlCd1lUNy80MFZjCjRPb1REa2tuTUJGaGJqRldlR0xTN2FPcEMrSDVzYzNhMitPbUp6T1JncUl4L3BPMDRXN2l4eGpWd0RxeUxRTFAKS1I3U2dhN29Sb05tVnNHMG9MWEs4MGxvM0o3cEN2MTJoa0lDc0svMW8rZDUyUVovQkZ1dDFKSkxXSVJtdVVCbApBYzlKYmJMRVBESkZpbjlZR0tONzhoQkllMHhmOTJUZmNjNmxLcEZIb2U5SFBxZWYvR1RYT1lLbmszZXF3VGhCCkhROHE4RjJrcG45eTVaY3dxZmU2bE1JQkpHK1NyZExlVGZobkJXMENBd0VBQWFPQ0FXQXdnZ0ZjTUE0R0ExVWQKRHdFQi93UUVBd0lGb0RBVEJnTlZIU1VFRERBS0JnZ3JCZ0VGQlFjREFUQU1CZ05WSFJNQkFmOEVBakFBTUIwRwpBMVVkRGdRV0JCU1hidFAxSXBJSlNZUGlpUjRHa3lXVWpURWhFVEFmQmdOVkhTTUVHREFXZ0JSNjJZekQxVUp4CjBsbVUzeHZKNzFYZFVtTUZyakNCcndZRFZSMFJCSUduTUlHa2dpRXFMbVY0Y0c5eWRHVnlMbTl3Wlc1emFHbG0KZEMxcGJuTnBaMmgwY3k1emRtT0NMeW91Wlhod2IzSjBaWEl1YjNCbGJuTm9hV1owTFdsdWMybG5hSFJ6TG5OMgpZeTVqYkhWemRHVnlMbXh2WTJGc2doOWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqCmdpMWxlSEJ2Y25SbGNpNXZjR1Z1YzJocFpuUXRhVzV6YVdkb2RITXVjM1pqTG1Oc2RYTjBaWEl1Ykc5allXd3cKTlFZTEt3WUJCQUdTQ0JGa0FnRUVKaE1rT0RKak5HTmlabVF0TUdSaE9DMDBZMkU1TFdFM05tWXRZekkxT1dSagpOell5TTJRM01BMEdDU3FHU0liM0RRRUJDd1VBQTRJQkFRQmwrY25xemNjNmpQRjgyRXh5UUo1Z25WS0I3SVJxCmJDQXhPbFhhWURGUnAxaTFJVVp3VEdUQVlDY3pEUEFVOFlIM2MybzZxUVdMZ01yWEh2NGZ2Q1lmczMwTktLT2IKY3JVNVpRM3VBUnFoeHlmQmVEbytxcEliR25TQlFuQVBHVmNDVnN5VnoxRWRMMGtpTFFtVTlnSW1IT2dJbmU2TgppODZMS0hZWVkzYUEzTDJPc3ZxbVhzRWFzUVdjSUhRNGxtNWQwMXdwL1dVelM5UzFtUXlLY2EyUGlSUkdtRWRLClJhZWFEYlY2WjNmM29ha1NWMmpxbmtzc0l6bHBiYUVhT25rNFZVTjhvWEhOTGkwZlZMcktGYkhETDFmMERlbzIKbSs4UllKTG1NYmdCZXhURUNwb05ybVU4THJlY2V3R2JnQXhRY2dxb1RPNnM1L3hJWENqeGhvVXgKLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlldTdscGhCMWFpZ3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMzTmpnM01EVXdOekFlCkZ3MHlOakEwTWpJeE5UQTRNalphRncweU9EQTJNakF4TlRBNE1qZGFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM056WTROekExTURjd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEZDZvY3JJVkxYeGI0WmZyMHpRUTZtTFJpM0lESEhyMVh5CkJxMjNFNjdlWDYyK2ViOTFzelNSVVYwMUVJbmRiUHpxcENWaDhkMjNvZm9iODlWY3ZQYkhUa3FlVkU5Z3lqOTcKM21VYjZ6Y01uLzhzS3U0OHdZbFdnUFlMaDdFS1EzUC9NWnRlY1NocXQrY004bkh1TDdoQm11U3IvWWtQYUExcgpzVUZNM2xFajV0V1ZQMm9teUtrVTBHSWhtV0NYNHVLdFZTVVhhQ1RZMEduc3pGaVNEbXl2TDlONkF1RmlvS21LClREWWl1RTN0RGQ3UnJWbTNlazgxb3JscFJraVJSQ2pHb25tTUdYSFN4Z2p1U0h4azFnZHlETG5KUnJURzkvdGwKZm9lRXFlWXpRcXJuTkp3YWhOQThSYVY5RCtYaXh1V2FnZDRveTYrWjlic3hvZFZKbFJRVEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUjYyWXpECjFVSngwbG1VM3h2SjcxWGRVbU1GcmpBZkJnTlZIU01FR0RBV2dCUjYyWXpEMVVKeDBsbVUzeHZKNzFYZFVtTUYKcmpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWltYnhoVTJkK3p0SUxORlZ5WnVmLzRHSW55V256UzZVaWJLLwpGUXp2MkNtT2d2bDNwUFlKZFpuclJDa21oTW9EbHA1eS90WFVVZ0ZXcmQzUTJsZllhVGN0MlNUbDBTMnFEeGljClhiNnVnUEw0RGdCNnlGZElxYkJuMjZIb3BkdWRBejNkazdoYk1PWmxmcEQ2K3dIS2J3ZEQrR0s2TXhCK09nL3AKTG55eE5lalNwVDlyZDdHTHpSb3pCZ3pwZEc3NmlRRFJGS2U1bUY4Mnc0MjlVLzdleFBZR2lVMklrakVvaitEVgp3OFoyV1FWNXBaci9mZU8yYVFRblhqTG9kRlM3N0oyQXhGSGFFMU9lMStlR2dmbFlxNHBxUXJIVTBjQU0zUG1OCjN0VTR1U1dEZTBocDA4bGE0V0VnT003d0ErVysxOWNvN0w2c0ZGWHFqSzQ2YVg4M0NnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T15:08:35Z" service.beta.openshift.io/expiry: "2028-04-21T15:08:35Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 82c4cbfd-0da8-4ca9-a76f-c259dc7623d7 creationTimestamp: "2026-04-22T15:08:36Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"82c4cbfd-0da8-4ca9-a76f-c259dc7623d7"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:08:36Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 82c4cbfd-0da8-4ca9-a76f-c259dc7623d7 resourceVersion: "6689" uid: 11941607-2e6f-4e23-8912-fdd82f0d865e type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-21T15:08:36Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 7abc7371-7bd4-4c7b-ba4c-cb061d9e03b8 service.beta.openshift.io/expiry: "2028-04-21T15:08:36Z" creationTimestamp: "2026-04-22T15:08:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7abc7371-7bd4-4c7b-ba4c-cb061d9e03b8"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-22T15:08:37Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 7abc7371-7bd4-4c7b-ba4c-cb061d9e03b8 resourceVersion: "6766" uid: 2fbde63e-6bd7-4d12-bdb5-f2b8f454ac78 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-22T15:05:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"54a8cc7a-1700-426a-9f07-c62ee44f2f62"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-22T15:05:30Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-22T15:41:30Z" name: operator-dockercfg-6mk5k namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 54a8cc7a-1700-426a-9f07-c62ee44f2f62 resourceVersion: "22278" uid: c93a6f7b-4c43-4549-ad6d-b3d378c790c6 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "27650"