--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-23T09:27:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9b3a2af0-0a9c-46a4-8659-3b290dfb0580"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:28:01Z" name: builder-dockercfg-szff4 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 9b3a2af0-0a9c-46a4-8659-3b290dfb0580 resourceVersion: "4066" uid: 73cd4a16-9335-4474-abfe-035b2089bbcd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDczNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-23T09:27:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"99b9f122-762a-40b0-9dae-9a58e68bf277"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:27:59Z" name: default-dockercfg-pn6bm namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 99b9f122-762a-40b0-9dae-9a58e68bf277 resourceVersion: "3940" uid: fc80de07-36e5-48d2-9fbb-f7aab8fcb313 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-23T09:27:45Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"17a23037-69f6-4a5e-b3c1-63680b8345ba"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:45Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:28:01Z" name: deployer-dockercfg-lbhht namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: 17a23037-69f6-4a5e-b3c1-63680b8345ba resourceVersion: "4065" uid: 3b9e0454-a0ca-43be-9abd-c537b0023a0d type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDcyMiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: gather creationTimestamp: "2026-04-23T09:27:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"9c6a6e73-ebff-433d-9b2f-a9b1a92c51ce"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:27:59Z" name: gather-dockercfg-gfqnh namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: gather uid: 9c6a6e73-ebff-433d-9b2f-a9b1a92c51ce resourceVersion: "3941" uid: e60bfc27-6d86-41da-99c5-6e7c6f8b184b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NTA5NCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: insights-runtime-extractor-sa creationTimestamp: "2026-04-23T09:27:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"8f9e623b-1b2e-45df-b5bc-7682ea645f22"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:27:59Z" name: insights-runtime-extractor-sa-dockercfg-qqv29 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: insights-runtime-extractor-sa uid: 8f9e623b-1b2e-45df-b5bc-7682ea645f22 resourceVersion: "3945" uid: cc14c2ec-5d9d-49d1-9be4-269e04416a96 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/exporter with hostname exporter.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: insights-runtime-extractor-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T09:31:43Z" service.beta.openshift.io/expiry: "2028-04-22T09:31:43Z" service.beta.openshift.io/originating-service-name: exporter service.beta.openshift.io/originating-service-uid: c469f993-34c2-4eaf-bb6e-49946c10771a creationTimestamp: "2026-04-23T09:31:44Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"c469f993-34c2-4eaf-bb6e-49946c10771a"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T09:31:44Z" name: insights-runtime-extractor-tls namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: exporter uid: c469f993-34c2-4eaf-bb6e-49946c10771a resourceVersion: "7460" uid: 0dfcb64e-c3e5-4e16-bbcf-241cd6e43789 type: kubernetes.io/tls - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/metrics with hostname metrics.openshift-insights.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: openshift-insights-serving-cert''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-22T09:31:37Z" service.alpha.openshift.io/originating-service-name: metrics service.alpha.openshift.io/originating-service-uid: 7b57ff13-2250-4362-b02a-c9f4884f8bbf service.beta.openshift.io/expiry: "2028-04-22T09:31:37Z" creationTimestamp: "2026-04-23T09:31:38Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"7b57ff13-2250-4362-b02a-c9f4884f8bbf"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-23T09:31:38Z" name: openshift-insights-serving-cert namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: Service name: metrics uid: 7b57ff13-2250-4362-b02a-c9f4884f8bbf resourceVersion: "7299" uid: 6ca0c782-3c7e-4f08-82c7-4cefe1b37f64 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDc1OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: operator creationTimestamp: "2026-04-23T09:27:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"757ae2ee-1698-4dca-b93d-66ef9838db79"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-23T09:27:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-23T09:27:59Z" name: operator-dockercfg-2db27 namespace: openshift-insights ownerReferences: - apiVersion: v1 kind: ServiceAccount name: operator uid: 757ae2ee-1698-4dca-b93d-66ef9838db79 resourceVersion: "3944" uid: 8176483e-4364-41f1-b7fd-6c358f9bbe47 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "15989"