--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-17T10:14:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7803d15e-e3b1-40a4-ac17-1321862354c1"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:48Z" name: builder-dockercfg-zvkd7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7803d15e-e3b1-40a4-ac17-1321862354c1 resourceVersion: "22158" uid: 68e09286-3194-44c9-9188-e62e742ace84 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-17T10:14:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0c5b51bd-3245-4d48-855a-8fe72cfd2e8d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:43Z" name: default-dockercfg-wbckb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0c5b51bd-3245-4d48-855a-8fe72cfd2e8d resourceVersion: "21987" uid: bb171d4d-eed9-4338-a594-9f40ace6c490 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-17T10:14:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"e24fde6a-26b3-47a7-a679-62ce3b0e1b8d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:47Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:48Z" name: deployer-dockercfg-lwmdb namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: e24fde6a-26b3-47a7-a679-62ce3b0e1b8d resourceVersion: "22144" uid: ce6ff5e3-1925-4d02-9e63-30a6997d650f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-17T10:14:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"d40d5577-d1ff-4f82-b41d-db2943d86b90"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:43Z" name: gather-dockercfg-g246n namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: d40d5577-d1ff-4f82-b41d-db2943d86b90 resourceVersion: "22004" uid: 3191af64-943b-4360-bc31-2ca2e540fa62 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-17T10:14:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"cbfcb965-4794-45f1-872f-eab6b02f2993"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:43Z" name: insights-runtime-extractor-sa-dockercfg-7l8hg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: cbfcb965-4794-45f1-872f-eab6b02f2993 resourceVersion: "22005" uid: 08999141-1f7d-407f-abb4-7bb9a86c7741 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T10:18:37Z" service.beta.openshift.io/expiry: "2028-04-16T10:18:37Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: f99915c2-5263-47f4-a778-398347a22493 creationTimestamp: "2026-04-17T10:18:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"f99915c2-5263-47f4-a778-398347a22493"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T10:18:37Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: f99915c2-5263-47f4-a778-398347a22493 resourceVersion: "7506" uid: 1e6772f0-61d0-426a-a7f8-e9481a6697c1 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-16T10:18:08Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 0d1e3695-e2bb-4d30-8b6a-45fbf277940c service.beta.openshift.io/expiry: "2028-04-16T10:18:08Z" creationTimestamp: "2026-04-17T10:18:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"0d1e3695-e2bb-4d30-8b6a-45fbf277940c"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-17T10:18:09Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 0d1e3695-e2bb-4d30-8b6a-45fbf277940c resourceVersion: "6091" uid: 8410bda5-b2f7-493d-870d-6e34bb67ada4 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-17T10:14:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0866538f-5446-43e9-9fea-c2870e2ce586"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-17T10:14:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-17T10:50:43Z" name: operator-dockercfg-r2r5q namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 0866538f-5446-43e9-9fea-c2870e2ce586 resourceVersion: "21991" uid: 2c261935-a373-4a37-9b14-b5b70d7ca353 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "26034"