--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-03-12T13:35:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c1bc7705-7e64-4659-b61f-632479c43dd0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:29Z" name: builder-dockercfg-rsd6h namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: c1bc7705-7e64-4659-b61f-632479c43dd0 resourceVersion: "4369" uid: 78b58436-6304-4873-8aae-51a88637004f type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczMyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"254adf96-80e2-4042-8f13-0201b71eb28d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: default-dockercfg-k45vg namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 254adf96-80e2-4042-8f13-0201b71eb28d resourceVersion: "4134" uid: 8f5093cf-a8d5-4779-99a4-8b6b5c4ddea6 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-03-12T13:35:23Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"09783bd7-a7a8-426d-870c-9e697e7b4ab8"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:23Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:29Z" name: deployer-dockercfg-sptqw namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 09783bd7-a7a8-426d-870c-9e697e7b4ab8 resourceVersion: "4368" uid: f17d3e91-0899-4b82-8723-3c1899425b6d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fa5f1e43-a054-4821-a372-d20ee1b45d98"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: gather-dockercfg-ttkt7 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: fa5f1e43-a054-4821-a372-d20ee1b45d98 resourceVersion: "4142" uid: d9eb8278-9640-412b-a174-71b744f7e542 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5MyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4a906823-ca42-44ce-9d6e-255c18a18ba7"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: insights-runtime-extractor-sa-dockercfg-4sgvv namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 4a906823-ca42-44ce-9d6e-255c18a18ba7 resourceVersion: "4145" uid: ae9b2166-1302-4c39-b3f2-1ae3f6f30b16 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-11T13:38:45Z" service.beta.openshift.io/expiry: "2028-03-11T13:38:45Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: 575da189-1fd1-457b-b52e-a5440576d655 creationTimestamp: "2026-03-12T13:38:46Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"575da189-1fd1-457b-b52e-a5440576d655"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-12T13:38:46Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: 575da189-1fd1-457b-b52e-a5440576d655 resourceVersion: "6792" uid: ac0bcb0f-a037-490e-8f14-918061a40772 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-03-11T13:38:46Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 1430c97d-d33a-4eed-b9c4-5c863039f447 service.beta.openshift.io/expiry: "2028-03-11T13:38:46Z" creationTimestamp: "2026-03-12T13:38:47Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"1430c97d-d33a-4eed-b9c4-5c863039f447"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-03-12T13:38:47Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 1430c97d-d33a-4eed-b9c4-5c863039f447 resourceVersion: "6805" uid: b68d903b-e520-412b-961d-8bcf01aaf6df type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1NyBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-03-12T13:35:18Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0cea4eed-b217-42f3-9e43-0c675b38557f"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-03-12T13:35:18Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-03-12T13:35:26Z" name: operator-dockercfg-5v7ck namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 0cea4eed-b217-42f3-9e43-0c675b38557f resourceVersion: "4146" uid: 5f2735c4-18ed-428a-9d60-f02710ff0a73 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "21978"