--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T08:47:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f1228da-4961-4895-9e3b-5b75b24f59fd"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:43Z" name: builder-dockercfg-ggk4t namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 7f1228da-4961-4895-9e3b-5b75b24f59fd resourceVersion: "4154" uid: 17ed1a16-81eb-4ee5-a98c-1eafa6f4efe1 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T08:47:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"5f1c40ec-df5d-49ef-aa1d-5dafa3d0b843"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:39Z" name: default-dockercfg-xxwhl namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 5f1c40ec-df5d-49ef-aa1d-5dafa3d0b843 resourceVersion: "3590" uid: 14b143ea-2a37-4c41-8baf-409e45c9f729 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T08:47:43Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:43Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"7f273bc1-44dd-4181-bd89-323403e52c55"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:43Z" name: deployer-dockercfg-zp2pz namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 7f273bc1-44dd-4181-bd89-323403e52c55 resourceVersion: "4150" uid: 2ab93c1c-5c5d-4bec-94ca-23fde91c0863 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-23T08:47:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"6906c55e-0791-4961-af09-922f86aa95e0"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:38Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:39Z" name: gather-dockercfg-vvnkn namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 6906c55e-0791-4961-af09-922f86aa95e0 resourceVersion: "3595" uid: edc5b6fb-b837-41c3-9e1a-54bb18913a27 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-23T08:47:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ad0863df-e686-4e77-9790-42d07b118def"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:39Z" name: insights-runtime-extractor-sa-dockercfg-vx78w namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: ad0863df-e686-4e77-9790-42d07b118def resourceVersion: "3600" uid: a2e47b4d-acbe-47e9-b5a2-63aee408e4a9 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T08:53:16Z" service.beta.openshift.io/expiry: "2028-04-22T08:53:16Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: bfa2f108-c6d1-488b-a526-3c2954e08345 creationTimestamp: "2026-04-23T08:53:17Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"bfa2f108-c6d1-488b-a526-3c2954e08345"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T08:53:17Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: bfa2f108-c6d1-488b-a526-3c2954e08345 resourceVersion: "7863" uid: ae714ed2-88ce-4c7b-b475-beebfbd9646b type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUQ2akNDQXRLZ0F3SUJBZ0lJYU5hT1hTWDFCN1l3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qa3pORE00TkRBZQpGdzB5TmpBME1qTXdPRFV6TVRGYUZ3MHlPREEwTWpJd09EVXpNVEphTUNreEp6QWxCZ05WQkFNVEhtMWxkSEpwClkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXpDQ0FTSXdEUVlKS29aSWh2Y05BUUVCQlFBRGdnRVAKQURDQ0FRb0NnZ0VCQUwwc0oremlxQjlydmlQMFo5bExlS1ZMWmV1N2RrbGgxU2lKR2dxVEU3UHAwemEwd0ErSwpzMTZWckpOdVdBN04vUmIxVXJYYU9aQlE0a1VYK0NSd3RZdCttL3JxM3NRNlkvb24wdTg5dS9yRFRYVmEzd2tWCjVQMWw5RHB1dG50S0Y2eTdEdUVEL3Z4RG1XVzZ6TUtlTWx0dVAyTENJWGpodjI2QXFXSitFNFRYeVI3akNTWXAKYWh0K00zUWNxNDFFUVdhaEJ2WDczSVJoRGRaMUdhcS8yV3ltUlZkSVpvTkRYMVBiMVo0eXM1MExQS3U4U1QzbQpDa1BmZTBMV0ZUMytxU0M4YmJpOHIwUzQrZ2VKSDBFRHptUEYwNHJ2cFVzUzVTb29RVlJlSEhkVnA2UmZoTG5QClY2NkZUSDdlS0NrdWQxMUVtMENHTUVWS2hWeGlwS3hhclIwQ0F3RUFBYU9DQVFjd2dnRURNQTRHQTFVZER3RUIKL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTUJnTlZIUk1CQWY4RUFqQUFNQjBHQTFVZApEZ1FXQkJSRFJtVHpOZ05vNThKcUNrSkRxYk40ZTFjU1BUQWZCZ05WSFNNRUdEQVdnQlNKUzZMRUl6TUYxYTVDCjZ0VW4xTUdVK0ZZWk56QlhCZ05WSFJFRVVEQk9naDV0WlhSeWFXTnpMbTl3Wlc1emFHbG1kQzFwYm5OcFoyaDAKY3k1emRtT0NMRzFsZEhKcFkzTXViM0JsYm5Ob2FXWjBMV2x1YzJsbmFIUnpMbk4yWXk1amJIVnpkR1Z5TG14dgpZMkZzTURVR0N5c0dBUVFCa2dnUlpBSUJCQ1lUSkRreU1qWmtOVFpsTFRoa1pEY3RORFJtT0MxaVpXUXlMV1k0Ck9EWXpZakEwWkRJek9EQU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFQTmFtdVh1L1JoN0RHQ3JwZ3lyeHpUYTMKaGdKYS9yNWU5Y1NSOFZtdGwwdU5ueGxYTnhpQVJUNWdqbjBLdVg4MzczVi9nSmlMNEVGKzQvaTVNM3dvR1c2SAo1c0lOOHNXamJlR2xIM3dMQWRLeGxHV3hTYjBzcXh1aGd1T21NeWVpbDgxcitOa2Z6dy8zYWxiT3I3NW9kQ1B3CjF0ZGRORmdqcEVSczJqUDlRdmVoQjdvWjJncjZ2NTZLQ2VuRW10Q0k0bHBwT1VueWtONHFscW5QbENSNSt5QTEKdldnYmFzK0l3V2ROcUhSeUFsUnVlbkxEbzZ1dTI3VXJYR1FURzBaNXlFOVJoeWdvS3BJUEF1Zm1UeDZldzVaSwpOV0RVb0MvZmdIQVQ0NVF5djNhU1Z2WkFsdldZNVo0dVRvaVhTbHF0blJoNWZKVzE5OUtDbHplRTVsZHllQT09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0KLS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURVVENDQWptZ0F3SUJBZ0lJTEtuK1prWHhONnN3RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjM05qa3pORE00TkRBZQpGdzB5TmpBME1qTXdPRFV6TUROYUZ3MHlPREEyTWpFd09EVXpNRFJhTURZeE5EQXlCZ05WQkFNTUsyOXdaVzV6CmFHbG1kQzF6WlhKMmFXTmxMWE5sY25acGJtY3RjMmxuYm1WeVFERTNOelk1TXpRek9EUXdnZ0VpTUEwR0NTcUcKU0liM0RRRUJBUVVBQTRJQkR3QXdnZ0VLQW9JQkFRQzgwNmlVTENpeklyaHFSSTlueHRZTHBLb05XdFVCdWdWbwphWVFRR2gxTURsekUvS0RYbGZ1dDk2WjNiRVA2WHl3MkkvQVh4dG1ObWZkWUw4b3ZDck81cXF5VnBlSEhhYkdtCmdMOGFsWUt3TVZielZKR3gxSys0WHZnakltOWRLZWZZVHMrenhBTkFTSGZ6MTVmTzJYWml4OXhvdVBaRTdsNTQKdVd1QXIyT1p0bHJOL05CWnhYOUE1Q280cVNFV2VLUWVWalhkcGNURW0wWE5JekwxZGdteWFGNkcyem1qRGF4dgpsOXNoWDVvMk4rZTJObDNnTzVrQVFaWnRDWGhxQkZCN1R4b1BkcXRYZ3doQXlLU04wdENNTURRcHFlQk9PaXNHClBMcWRBMmZQb3NZbDNKaXpkWU43Z2dvNWtPcG1YWHo5cXgzRlYzb3BicWMyRHl3N2UzcGRBZ01CQUFHall6QmgKTUE0R0ExVWREd0VCL3dRRUF3SUNwREFQQmdOVkhSTUJBZjhFQlRBREFRSC9NQjBHQTFVZERnUVdCQlNKUzZMRQpJek1GMWE1QzZ0VW4xTUdVK0ZZWk56QWZCZ05WSFNNRUdEQVdnQlNKUzZMRUl6TUYxYTVDNnRVbjFNR1UrRllaCk56QU5CZ2txaGtpRzl3MEJBUXNGQUFPQ0FRRUFENXFNN3NnQmpLeXROUmNReHlTNmROZWtGb2pydEoxUEEzRGMKdEUzejZ4OVZiS0owdHVOeHJhQ0ZnUFNOSVVZZEwwWkZ6K0FYT1U1SnhxR0hXemc5MzhrU1JnK014U3ducWVGegpVKy82TDJESWphUDVmZEtQNERvZ2t0ZFk4ckxzalNnTTE2a0xXZlduZXAyZEl6UmYzRGU1NGFxWUJGaWtncjRICmczQ3dBSVBocUp2RXhrRTZRMC9qTE5oYjRhZDZVRUpwY0NpeW1GY3h2OGFVY2s5bVFUTEJKb3UyZGdkdmFiTkkKd1k2dzhwOGo3VXp1Y1VJcXhYNCtGbmJxaWd0d2Y5RUlLOCtnYUM5NjByZGRhZ2hXdklWTXNqSDhyWktQYVMrRApLWFNUaDZ0dkJlQllhLzBiNXR5dktGQTZUcVlVckt4ZndNRFpMYnBJNjQxT3ZybXhuZz09Ci0tLS0tRU5EIENFUlRJRklDQVRFLS0tLS0K tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T08:53:12Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 9226d56e-8dd7-44f8-bed2-f8863b04d238 service.beta.openshift.io/expiry: "2028-04-22T08:53:12Z" creationTimestamp: "2026-04-23T08:53:12Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"9226d56e-8dd7-44f8-bed2-f8863b04d238"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T08:53:12Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 9226d56e-8dd7-44f8-bed2-f8863b04d238 resourceVersion: "7691" uid: 8a8183fc-dfb8-4ee7-9043-94d23e142b1b type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-23T08:47:39Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T08:47:39Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8cb77558-0297-4a4e-9fa8-5c7a8f4f1ef6"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T08:47:39Z" name: operator-dockercfg-m9j6d namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 8cb77558-0297-4a4e-9fa8-5c7a8f4f1ef6 resourceVersion: "3602" uid: 1f4c21b7-c3e6-48fd-aeac-b3f808698cee type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "16056"