--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2025-10-14T13:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"0641f830-f63e-4a54-8882-471e6672a072"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2025-10-14T13:12:09Z" name: default-dockercfg-cxvsj namespace: openshift-multus ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: 0641f830-f63e-4a54-8882-471e6672a072 resourceVersion: "13014" uid: 8fa86a9a-0250-468f-abdc-f72657383f9b type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: metrics-daemon-sa creationTimestamp: "2025-10-14T13:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c6876798-0e52-49fd-b1a7-bee0a6539d04"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2025-10-14T13:12:09Z" name: metrics-daemon-sa-dockercfg-c42q9 namespace: openshift-multus ownerReferences: - apiVersion: v1 kind: ServiceAccount name: metrics-daemon-sa uid: c6876798-0e52-49fd-b1a7-bee0a6539d04 resourceVersion: "13019" uid: e837d1ab-44e3-4df3-9ec3-2dd5d6886182 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/network-metrics-service with hostname network-metrics-service.openshift-multus.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: metrics-daemon-secret''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2027-10-14T13:08:33Z" service.alpha.openshift.io/originating-service-name: network-metrics-service service.alpha.openshift.io/originating-service-uid: 8e04bcd6-04c4-43c1-941b-8625b0621eb3 service.beta.openshift.io/expiry: "2027-10-14T13:08:33Z" creationTimestamp: "2025-10-14T13:08:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"8e04bcd6-04c4-43c1-941b-8625b0621eb3"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2025-10-14T13:08:33Z" name: metrics-daemon-secret namespace: openshift-multus ownerReferences: - apiVersion: v1 kind: Service name: network-metrics-service uid: 8e04bcd6-04c4-43c1-941b-8625b0621eb3 resourceVersion: "6908" uid: 38b2cbae-ed8a-4303-af9f-609978ad2603 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: multus-ac creationTimestamp: "2025-10-14T13:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"caf34511-8d34-4180-bf87-bf6d2f2ab49c"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2025-10-14T13:12:09Z" name: multus-ac-dockercfg-l545q namespace: openshift-multus ownerReferences: - apiVersion: v1 kind: ServiceAccount name: multus-ac uid: caf34511-8d34-4180-bf87-bf6d2f2ab49c resourceVersion: "13021" uid: 158a9e70-c25b-490d-b77e-5f728e279e34 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUVJRENDQXdpZ0F3SUJBZ0lJSVhySEtNZkowZW93RFFZSktvWklodmNOQVFFTEJRQXdOakUwTURJR0ExVUUKQXd3cmIzQmxibk5vYVdaMExYTmxjblpwWTJVdGMyVnlkbWx1WnkxemFXZHVaWEpBTVRjMk1EUTBOekk1TWpBZQpGdzB5TlRFd01UUXhNekE0TXpGYUZ3MHlOekV3TVRReE16QTRNekphTURzeE9UQTNCZ05WQkFNVE1HMTFiSFIxCmN5MWhaRzFwYzNOcGIyNHRZMjl1ZEhKdmJHeGxjaTV2Y0dWdWMyaHBablF0YlhWc2RIVnpMbk4yWXpDQ0FTSXcKRFFZSktvWklodmNOQVFFQkJRQURnZ0VQQURDQ0FRb0NnZ0VCQU82TVAvVTV4c0dNLzNOU0JhRmhuUUxrYlhWTQo3WWpMTnJxNUFRalp2ay8xR3VWRHIxRXZyNUZHczBTRE8vakYyeUh2WFFCR3hDQ0xEM3YxVHpGbFBNVlVFMkkvCmtDRGJmNFVOSEZkaXVTUUNGYm5ObFY1b042R2RqeFNPenNHN1lqVThBbjE2WTlkMnpLakExTXZnRVlBbjBrZWkKNHZWcmdqSTlOekM3N0dBWE5Cam0zVlVOdThVOEorWnFMRUphZjFVMUJCSHpkNnVEK0IvaEJGWDZ0aVFycnpaTgpvSW8xUkNsWXZpL3UrVjIvRmZMa0lZR0VLMTBhaGx1R2ZIRysvTENQOFBEc050YjljK1FvMnBuZjIybHhzb3NBCjVPVENQWUp0UUppLytna05aeHFUSm1TREo2YUpLamRsYUEwdFRkNVlYb1MrblVORU1mRDExNGxpSzJFQ0F3RUEKQWFPQ0FTc3dnZ0VuTUE0R0ExVWREd0VCL3dRRUF3SUZvREFUQmdOVkhTVUVEREFLQmdnckJnRUZCUWNEQVRBTQpCZ05WSFJNQkFmOEVBakFBTUIwR0ExVWREZ1FXQkJUTG9DYUJTNmxsM1Rzd3ZQL3pFS1d5TEhKK29EQWZCZ05WCkhTTUVHREFXZ0JSa0Z6NWlVWXZrSWNLYm15UWNhRmRCcGZxU01qQjdCZ05WSFJFRWREQnlnakJ0ZFd4MGRYTXQKWVdSdGFYTnphVzl1TFdOdmJuUnliMnhzWlhJdWIzQmxibk5vYVdaMExXMTFiSFIxY3k1emRtT0NQbTExYkhSMQpjeTFoWkcxcGMzTnBiMjR0WTI5dWRISnZiR3hsY2k1dmNHVnVjMmhwWm5RdGJYVnNkSFZ6TG5OMll5NWpiSFZ6CmRHVnlMbXh2WTJGc01EVUdDeXNHQVFRQmtnZ1JaQUlCQkNZVEpEa3dPR1F4TWpnNExXUTRObVl0TkdVM1pDMDUKTTJWbExUaG1NbVkyTnpZelltUXhOVEFOQmdrcWhraUc5dzBCQVFzRkFBT0NBUUVBTmxqWlZteDFKd015UGtkYgp1STUwZlFGSmtUcnFpS05HNHcvMGJsZUZ3TGp2Zmp0SUIxeCt2MGZ1K3FrN0hUQWpOc0syOE1JeHFLeHVDN2NaCisvTnVjdStiZmtTd0p3QmYxRjZqNE5XYzNTbnpTK0FHNURtSGpLN3FQdFhtejZidElkQmF5YWgvd0VxSzZUZUwKclpuV1F2TmE2bFo5Wmd1QVAvZXU3d1h3enZqYjR3R0xYWDB6UHphMXFUSDJKK3pqZkloOVc5V3lyU0xRRHBrRQpDZUJDcHdldVBOQ3Qra0xhQVRSQjlWVm1HNlI4OWNjaUZ1K1UwT3RtekVYYkhuVmZVckl6N2NhcVovRlIwOXd3CnBZOVZDQ3lkNURWVXB3SEtwQU5VeEtqK1lEMi83a1AwMWE3NGZmNkxaTEloZzRiL01oUnFPQnhVSTh0RzU2V0kKNXljcGRRPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQotLS0tLUJFR0lOIENFUlRJRklDQVRFLS0tLS0KTUlJRFVUQ0NBam1nQXdJQkFnSUlKSldOb1kzZlB1Z3dEUVlKS29aSWh2Y05BUUVMQlFBd05qRTBNRElHQTFVRQpBd3dyYjNCbGJuTm9hV1owTFhObGNuWnBZMlV0YzJWeWRtbHVaeTF6YVdkdVpYSkFNVGMyTURRME56STVNakFlCkZ3MHlOVEV3TVRReE16QTRNVEZhRncweU56RXlNVE14TXpBNE1USmFNRFl4TkRBeUJnTlZCQU1NSzI5d1pXNXoKYUdsbWRDMXpaWEoyYVdObExYTmxjblpwYm1jdGMybG5ibVZ5UURFM05qQTBORGN5T1RJd2dnRWlNQTBHQ1NxRwpTSWIzRFFFQkFRVUFBNElCRHdBd2dnRUtBb0lCQVFEUXdZRDNrOEVJcDlmZ2VtRWh6TW9WUTVueWhvbHc4TFZQCk5VeFQ2OU42Z1d2cUNsZ2EyUjVIQTBJWTF3ZS9uTk5DbEJ6NDVMMXhEclg0dmtBQXlMdjBrenpOd1h4Q2V4aGIKTEs2dFpBTS8vci9MeC8xbmZyUk0vUmtQQ0E3M09FVFhFZmxqcVpXTjdGQTQ0VDg0SFdSWVFLTHB4NnhnOThpTQp5bzRjbDJSeGR6WXBXQzQvT1dNeURtVWN6YmFyajE1dXh5N1Qyd05XNmZWMEEzZll4RmZWS05UZFcrYWFjK0ZZCkVOWWttTldsT0k1UFlaL3R0UHc3OEFCTVh0RUFDQW5XdTZZMnRncXhKaTczT1UrMkhPNG1SeGJtK0d0Yy80NFoKZllwNERkTG43VmVnbm9vWVVBZWVqckxZR1M2R3R2WTJXcFN1bStvc1NSMzJkUkFzV0o4SEFnTUJBQUdqWXpCaApNQTRHQTFVZER3RUIvd1FFQXdJQ3BEQVBCZ05WSFJNQkFmOEVCVEFEQVFIL01CMEdBMVVkRGdRV0JCUmtGejVpClVZdmtJY0tibXlRY2FGZEJwZnFTTWpBZkJnTlZIU01FR0RBV2dCUmtGejVpVVl2a0ljS2JteVFjYUZkQnBmcVMKTWpBTkJna3Foa2lHOXcwQkFRc0ZBQU9DQVFFQWcrZVd4VnZYelU2TU9ldURMWUNrdmFDQ2R5U0psdGNmRUlyQwpQa2Vod0JvbE9NN0cvNlJYWGtNd2ttcmIxTVd0QXJJdXJGQXZGdFdEQmduTmw3N1FSL2pjU2ErY2dxMjNab3V0ClpOSy9JK1dPVTg5NFhPWlRTanMwSWFqNkxvaDJMMXgyUVB3YjhhejNZMTRtZFM5dTkwMnpsYmJIencxTXZ0UzMKVTIvWnp0dTFHN3lQcHBwcDgzcTZiTUhGWlBhVEs0a3V4a1d5d3Z0bVhleDdlUWZoL0tTRExCbktnV0FwUmVCTgpiSlFxc09YM1dyQnFVcWpWaVA4V0NuT3BYL0lYRWNkTGhQZ3ZOcGZIRnRDOGhSRHd1VXd2MlpRbnNZV0lIbWxKCmFUY2xKdmFlcVlaSlZyYTRzcGc3SnFFeVM2WkN1VnorbnhPUXRDOVJHYmVqa2ZFZ2FnPT0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo= tls.key: MTY3OSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/multus-admission-controller with hostname multus-admission-controller.openshift-multus.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: multus-admission-controller-secret''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2027-10-14T13:08:32Z" service.alpha.openshift.io/originating-service-name: multus-admission-controller service.alpha.openshift.io/originating-service-uid: 908d1288-d86f-4e7d-93ee-8f2f6763bd15 service.beta.openshift.io/expiry: "2027-10-14T13:08:32Z" creationTimestamp: "2025-10-14T13:08:33Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.alpha.openshift.io/originating-service-name: {} f:service.alpha.openshift.io/originating-service-uid: {} f:service.beta.openshift.io/expiry: {} f:ownerReferences: .: {} k:{"uid":"908d1288-d86f-4e7d-93ee-8f2f6763bd15"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2025-10-14T13:08:33Z" name: multus-admission-controller-secret namespace: openshift-multus ownerReferences: - apiVersion: v1 kind: Service name: multus-admission-controller uid: 908d1288-d86f-4e7d-93ee-8f2f6763bd15 resourceVersion: "6817" uid: 4b262015-7921-4aac-a2ff-ff58db02cfb5 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.service-account: multus-ancillary-tools creationTimestamp: "2025-10-14T13:12:09Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"c29b0786-5b13-4c85-89eb-dd1fbf43859b"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2025-10-14T13:12:09Z" name: multus-ancillary-tools-dockercfg-x97tr namespace: openshift-multus ownerReferences: - apiVersion: v1 kind: ServiceAccount name: multus-ancillary-tools uid: c29b0786-5b13-4c85-89eb-dd1fbf43859b resourceVersion: "13022" uid: bea067ec-11aa-4e54-8d88-5c0f3f3f1c4b type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "61522"