--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-16T10:01:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ae98ad71-c583-4bcb-bd72-01d69d40dfd0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T10:01:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T10:37:18Z" name: builder-dockercfg-98rlh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: ae98ad71-c583-4bcb-bd72-01d69d40dfd0 resourceVersion: "21882" uid: 069683e4-269f-4c2e-94db-68bd0b72e669 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-16T10:01:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b0a01987-2e61-4963-b945-b51e191971d4"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T10:01:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T10:37:13Z" name: default-dockercfg-29g6b namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: b0a01987-2e61-4963-b945-b51e191971d4 resourceVersion: "21727" uid: 6e86eb09-c0b3-4691-b75a-51a389227cb4 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-16T10:01:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"a48b72f6-b32e-4aa2-b261-d19dd2df48c2"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T10:01:17Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T10:37:18Z" name: deployer-dockercfg-pjmxg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: a48b72f6-b32e-4aa2-b261-d19dd2df48c2 resourceVersion: "21881" uid: d95ef7ba-ffe4-4ff3-bd68-532459bc5227 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-16T10:01:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7ac2c7fd-1582-46ad-8c03-bdc4e3f7ceda"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T10:01:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T10:37:13Z" name: gather-dockercfg-znm7x namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 7ac2c7fd-1582-46ad-8c03-bdc4e3f7ceda resourceVersion: "21730" uid: d22c7b5f-42db-4b04-9082-ad981c345a1c type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-16T10:01:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"b18a945b-78fb-467b-b23a-2616d7f4d431"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T10:01:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T10:37:13Z" name: insights-runtime-extractor-sa-dockercfg-vnpkd namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: b18a945b-78fb-467b-b23a-2616d7f4d431 resourceVersion: "21736" uid: d4414307-4751-403f-b487-950d44f7fa0d type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T10:07:06Z" service.beta.openshift.io/expiry: "2028-04-15T10:07:06Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 5dbf12e5-51f7-43d3-9b6e-16a7e0560aab creationTimestamp: "2026-04-16T10:07:07Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"5dbf12e5-51f7-43d3-9b6e-16a7e0560aab"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T10:07:07Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 5dbf12e5-51f7-43d3-9b6e-16a7e0560aab resourceVersion: "7848" uid: ae7de18b-e6b9-4928-9f77-d7b6417e63a8 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-15T10:07:01Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 74ec998b-9239-42a4-8e2c-a709fd840ded service.beta.openshift.io/expiry: "2028-04-15T10:07:01Z" creationTimestamp: "2026-04-16T10:07:02Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"74ec998b-9239-42a4-8e2c-a709fd840ded"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-16T10:07:02Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 74ec998b-9239-42a4-8e2c-a709fd840ded resourceVersion: "7716" uid: 4af92e1a-9b6d-45a5-bb72-8a41d486a184 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-16T10:01:13Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"588cca85-e965-4f3d-a480-3bee94ff129c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-16T10:01:13Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-16T10:37:13Z" name: operator-dockercfg-sjqhx namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 588cca85-e965-4f3d-a480-3bee94ff129c resourceVersion: "21731" uid: 254de47a-ef8a-45dd-8488-a8b1dc282ac7 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "28624"