{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/alert-mgr-kueue-admission-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/alert-mgr-kueue-admission-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"alert-manager-kueue-admission\"},\"name\":\"alert-mgr-kueue-admission-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"alert-mgr-kueue-admission-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"alert-mgr-kueue-admission-controller-manager\",\"namespace\":\"kueue-external-admission\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:32:21Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "alert-manager-kueue-admission"
                },
                "name": "alert-mgr-kueue-admission-manager-rolebinding",
                "resourceVersion": "34191",
                "uid": "f2981e32-1b79-4969-be80-3fe91fbb5e2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-mgr-kueue-admission-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "alert-mgr-kueue-admission-controller-manager",
                    "namespace": "kueue-external-admission"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/alert-mgr-kueue-admission-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/alert-mgr-kueue-admission-metrics-auth-rolebinding\"},\"name\":\"alert-mgr-kueue-admission-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"alert-mgr-kueue-admission-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"alert-mgr-kueue-admission-controller-manager\",\"namespace\":\"kueue-external-admission\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:32:21Z",
                "name": "alert-mgr-kueue-admission-metrics-auth-rolebinding",
                "resourceVersion": "34194",
                "uid": "e4a903fb-fee4-4da3-89d7-3557ab745adc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-mgr-kueue-admission-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "alert-mgr-kueue-admission-controller-manager",
                    "namespace": "kueue-external-admission"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:16:06Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-main",
                "resourceVersion": "11497",
                "uid": "4187bf50-9b66-40e2-964c-370fd56cd139"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alertmanager-main"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "alertmanager-main",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding\"},\"name\":\"application-service-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"application-service-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"application-service-controller-manager\",\"namespace\":\"application-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "application-service-manager-rolebinding",
                "resourceVersion": "19385",
                "uid": "b3aa0a97-e56c-4551-a597-e12978217ce8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "application-service-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "application-service-controller-manager",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding-build",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding-build\"},\"name\":\"application-service-manager-rolebinding-build\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"application-service-manager-role-build\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"application-service-controller-manager\",\"namespace\":\"application-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "application-service-manager-rolebinding-build",
                "resourceVersion": "19391",
                "uid": "c53a7bbe-1b94-465d-ae18-9ac63ad2de8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "application-service-manager-role-build"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "application-service-controller-manager",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding-spi",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding-spi\"},\"name\":\"application-service-manager-rolebinding-spi\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"application-service-manager-role-spi\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"application-service-controller-manager\",\"namespace\":\"application-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "application-service-manager-rolebinding-spi",
                "resourceVersion": "19390",
                "uid": "c21eb380-74a9-47ed-9ba7-050162bc7eb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "application-service-manager-role-spi"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "application-service-controller-manager",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-proxy-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-proxy-rolebinding\"},\"name\":\"application-service-proxy-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"application-service-proxy-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"application-service-controller-manager\",\"namespace\":\"application-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "application-service-proxy-rolebinding",
                "resourceVersion": "19394",
                "uid": "6a8d0493-d206-447c-984b-627233c10f3f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "application-service-proxy-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "application-service-controller-manager",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"appstudio-openshift-gitops-argocd-application-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"appstudio-openshift-gitops-argocd-application-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:26:07Z",
                "name": "appstudio-openshift-gitops-argocd-application-controller",
                "resourceVersion": "16603",
                "uid": "51d0c807-9746-4c5b-a562-5edb89f0172b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"appstudio-openshift-gitops-argocd-server\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"appstudio-openshift-gitops-argocd-server\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-server\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:26:07Z",
                "name": "appstudio-openshift-gitops-argocd-server",
                "resourceVersion": "16604",
                "uid": "3b337db2-f33c-4e95-914c-8c28c2d750d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:52Z",
                "name": "aws-ebs-csi-driver-operator-clusterrolebinding",
                "resourceVersion": "1403",
                "uid": "343109cb-64ba-4042-b442-85a42c8454ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "aws-ebs-csi-driver-operator-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-operator",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:56Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "aws-pod-identity-webhook",
                "resourceVersion": "2471",
                "uid": "6d87eab6-0139-4dfb-87d2-53b3ba7dbc64"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "aws-pod-identity-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-pod-identity-webhook",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:07:55Z",
                "name": "backplane-cee-c0",
                "resourceVersion": "4849",
                "uid": "3ec4472d-a179-4d59-8dac-88cf4b1fffbd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-cee-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:07:56Z",
                "name": "backplane-cee-c1",
                "resourceVersion": "4892",
                "uid": "c30e7692-0ab1-4d63-acb9-5d18964000e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:03Z",
                "name": "backplane-cluster-admin",
                "resourceVersion": "5105",
                "uid": "8163ea09-92c4-42ae-adfb-650bcea030f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "backplane-cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:31Z",
                "name": "backplane-cse-c0",
                "resourceVersion": "5829",
                "uid": "9eaf58e6-4165-4ca7-8bc7-cb11446214c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:24Z",
                "name": "backplane-csm-c0",
                "resourceVersion": "5596",
                "uid": "a2891046-bf2d-4921-860d-c855557e186e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-csm-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:24Z",
                "name": "backplane-csm-c1",
                "resourceVersion": "5597",
                "uid": "1dffae24-75e8-4310-bdc2-513149de65b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:02Z",
                "name": "backplane-impersonate-cluster-admin",
                "resourceVersion": "5100",
                "uid": "8e05f663-792c-4ea1-aed7-12913c3f9d08"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-impersonate-cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:06Z",
                "name": "backplane-lpsre-c0",
                "resourceVersion": "5164",
                "uid": "ac8fd243-3e60-4427-ab53-71a881cf2eb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:06Z",
                "name": "backplane-lpsre-c1",
                "resourceVersion": "5166",
                "uid": "6058e3d9-e478-48d1-8ea4-0ec1a090d7c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:03Z",
                "name": "backplane-lpsre-package-operator-c0",
                "resourceVersion": "5110",
                "uid": "8b459d84-b2c2-4bd6-a4a9-4a68a5635e7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:33Z",
                "name": "backplane-mcs-tier-two-c0",
                "resourceVersion": "5854",
                "uid": "ded03c54-4526-40e5-8dfe-69aeb62a1b7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-mcs-tier-two-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:33Z",
                "name": "backplane-mcs-tier-two-c1",
                "resourceVersion": "5857",
                "uid": "cfeb41e7-345b-47cc-a3fa-9a75f24430c2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:07:56Z",
                "name": "backplane-mobb-c0",
                "resourceVersion": "4885",
                "uid": "40a560a7-ee89-4bf7-89c7-97adec9f74a2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-mobb-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:07:56Z",
                "name": "backplane-mobb-c1",
                "resourceVersion": "4895",
                "uid": "c468400d-1e9f-46df-a51c-ad79c3b7abf5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:12Z",
                "name": "backplane-srep-c0",
                "resourceVersion": "5296",
                "uid": "7fd68174-0892-4002-82dd-f4508541e5e4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:12Z",
                "name": "backplane-srep-c1",
                "resourceVersion": "5299",
                "uid": "86cc2318-f815-4046-9652-a3190e38e546"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:41Z",
                "name": "backplane-srep-ro-c0",
                "resourceVersion": "6002",
                "uid": "1300ab31-fb3b-49e2-90a2-dd27e05c317e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:41Z",
                "name": "backplane-srep-ro-c1",
                "resourceVersion": "6006",
                "uid": "294149ef-43c4-4a96-853e-0b0236f8430c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:51Z",
                "name": "backplane-tam-c0",
                "resourceVersion": "6188",
                "uid": "c3cd4837-45dc-45b4-89d1-a4243b522252"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-tam-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:51Z",
                "name": "backplane-tam-c1",
                "resourceVersion": "6189",
                "uid": "7f0b6d2d-badb-4f25-9469-df5de383fdd0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "basic-users",
                "resourceVersion": "413",
                "uid": "9a419f7f-abca-4dcb-98f4-71ec66703978"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "basic-user"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-maintainers\"},\"name\":\"build-maintainers\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"build-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-build\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "build-maintainers",
                "resourceVersion": "19355",
                "uid": "4bf0e23f-705a-4fa4-8d8d-bced6f76c92c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "build-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-build"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-pipeline-runner-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-pipeline-runner-rolebinding\"},\"name\":\"build-pipeline-runner-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"appstudio-pipelines-runner\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"build-service-controller-manager\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "build-pipeline-runner-rolebinding",
                "resourceVersion": "19357",
                "uid": "0b6427bd-135b-4ac3-94c1-caba0527c4d5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-service-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-service-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"build-service\"},\"name\":\"build-service-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"build-service-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"build-service-controller-manager\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "build-service"
                },
                "name": "build-service-manager-rolebinding",
                "resourceVersion": "19350",
                "uid": "3c035c8b-3898-4124-af73-b648e1086dd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "build-service-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-service-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-service-metrics-auth-rolebinding\"},\"name\":\"build-service-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"build-service-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"build-service-controller-manager\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "build-service-metrics-auth-rolebinding",
                "resourceVersion": "19352",
                "uid": "a467fbc8-3d5c-4f79-af64-ceac19de93dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "build-service-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:07Z",
                "labels": {
                    "app": "cainjector",
                    "app.kubernetes.io/component": "cainjector",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cainjector",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-cainjector",
                "resourceVersion": "24281",
                "uid": "3806def5-b78c-44e8-9e2b-79d72e652aae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-cainjector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-cainjector",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:21Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "cert-manager",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-approve:cert-manager-io",
                "resourceVersion": "26025",
                "uid": "115bd1a5-0b7e-465c-b14b-e4195f9321b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-approve:cert-manager-io"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:08Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-certificates",
                "resourceVersion": "24423",
                "uid": "18f28084-b8aa-43c3-a1b6-fd6b73fe4ba2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-certificates"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:23Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "cert-manager",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-certificatesigningrequests",
                "resourceVersion": "26203",
                "uid": "48eac33d-8e25-4bc3-b0b8-067a6b229770"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-certificatesigningrequests"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:10Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-challenges",
                "resourceVersion": "24807",
                "uid": "9c9b2dd6-6d49-4882-b6be-fd17a66fe757"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-challenges"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:11Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-clusterissuers",
                "resourceVersion": "25071",
                "uid": "1664fc60-c709-47ab-847c-2937e078e6cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-clusterissuers"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:12Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-ingress-shim",
                "resourceVersion": "25190",
                "uid": "8f14fc0e-0afa-461b-bbe3-4df820b9a6b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-ingress-shim"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:14Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-issuers",
                "resourceVersion": "25478",
                "uid": "6b46b120-e391-4bba-816a-8e16436c921e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-issuers"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:15Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-orders",
                "resourceVersion": "25567",
                "uid": "3ef36c46-296c-4fb0-9cba-50ca45461f59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-orders"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:00Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "cert-manager-operator.v1.19.0",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "cert-manager-operator",
                    "olm.permissions.hash": "36mkiMkmVRH2ejto46kKtoZUuW53wsw7UORYy7",
                    "operators.coreos.com/openshift-cert-manager-operator.cert-manager-operator": ""
                },
                "name": "cert-manager-operator.v1-7c4vxSxa58nP2OcmCxGf7QawTQBgsBwclPRGuB",
                "resourceVersion": "24843",
                "uid": "1843d00e-42d8-4ad8-a1e6-1f87f8fa5bae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-operator.v1-7c4vxSxa58nP2OcmCxGf7QawTQBgsBwclPRGuB"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:10Z",
                "labels": {
                    "app": "webhook",
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "webhook",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-webhook:subjectaccessreviews",
                "resourceVersion": "24725",
                "uid": "4fb24a30-fc3e-4479-b43c-dc93963331e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-webhook:subjectaccessreviews"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-webhook",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:37Z",
                "name": "cloud-credential-operator-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "813",
                "uid": "69608329-ffbe-497a-9470-956ee85c6014"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:14Z",
                "name": "cloud-network-config-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3568",
                "uid": "c392d96c-3de5-4bc2-af79-ac7c4e61ca83"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cloud-network-config-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-network-config-controller",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:30Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "cluster-admin",
                "resourceVersion": "209",
                "uid": "289483b9-cce9-44d5-80e2-2310c2ff3ea9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:masters"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "cluster-admins",
                "resourceVersion": "411",
                "uid": "70fee519-efb4-4440-99fe-d20efff4623d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:cluster-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:45Z",
                "labels": {
                    "k8s-addon": "cluster-autoscaler.addons.k8s.io",
                    "k8s-app": "cluster-autoscaler"
                },
                "name": "cluster-autoscaler",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1103",
                "uid": "0592c989-23f3-4e31-9ff8-81387183d9ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:39Z",
                "name": "cluster-autoscaler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "887",
                "uid": "e098925f-41b2-42d8-990c-12e2525a574f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler-operator",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:52Z",
                "name": "cluster-monitoring-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1397",
                "uid": "370223be-ce9a-4559-ba2b-75bf4e938b43"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:41Z",
                "name": "cluster-network-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "955",
                "uid": "3ff21ac3-7a32-4f82-991d-95efad7f084d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-network-operator",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:52Z",
                "name": "cluster-node-tuning-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1406",
                "uid": "a2d4b746-170c-438c-84b5-ef2ea69522ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-node-tuning-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-node-tuning-operator",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:54Z",
                "name": "cluster-node-tuning:tuned",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1853",
                "uid": "127e710e-01ef-4275-89e1-f856b1a07ae9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-node-tuning:tuned"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tuned",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "cluster-readers",
                "resourceVersion": "412",
                "uid": "8514770e-d574-429a-bfe1-10247b08f846"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:cluster-readers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:55Z",
                "name": "cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "2248",
                "uid": "c1ed57aa-5a92-4990-aa55-3063c4f72da3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-samples-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:50Z",
                "name": "cluster-samples-operator-imageconfig-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1289",
                "uid": "0f56f1b7-8195-4550-a789-1c2e33c05419"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-samples-operator-imageconfig-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:51Z",
                "name": "cluster-samples-operator-proxy-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1355",
                "uid": "49d9faeb-ce27-4d71-ab88-ce3ea7e76880"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-samples-operator-proxy-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "cluster-status-binding",
                "resourceVersion": "418",
                "uid": "b5f527a5-c095-4467-98d1-c754f7f7e842"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-status"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Storage",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:41Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "cluster-storage-operator-role",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "962",
                "uid": "53aef78f-41b2-43be-a247-69bbcba58e67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-storage-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"include.release.openshift.io/self-managed-high-availability\":\"true\",\"kubernetes.io/description\":\"Grant the cluster-version operator permission to perform cluster-admin actions while managing the OpenShift core.\"},\"name\":\"cluster-version-operator\"},\"roleRef\":{\"kind\":\"ClusterRole\",\"name\":\"cluster-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"default\",\"namespace\":\"openshift-cluster-version\"}]}\n",
                    "kubernetes.io/description": "Grant the cluster-version operator permission to perform cluster-admin actions while managing the OpenShift core."
                },
                "creationTimestamp": "2026-04-24T21:05:28Z",
                "name": "cluster-version-operator",
                "resourceVersion": "513",
                "uid": "cabbfb70-423f-4a24-82b8-f5bf7877871c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:58Z",
                "name": "console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "2711",
                "uid": "0fe76d50-f1a9-45e0-9cd8-c4d217a4a0fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:58Z",
                "name": "console-auth-delegator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "2725",
                "uid": "2d0d15a4-a61d-4b07-b047-0ae11aff13b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:58Z",
                "name": "console-extensions-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "2709",
                "uid": "54db5ea0-302c-449c-9546-06618a3cb91f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console-extensions-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:58Z",
                "name": "console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "2708",
                "uid": "84c1534c-6c0d-4256-9f49-845bd4144a4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:58Z",
                "name": "console-operator-auth-delegator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "2710",
                "uid": "832c8f24-224d-4e6f-9b1a-105e03aa6ba2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/console-sa-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/console-sa-binding\",\"operator.min.io/authors\":\"MinIO, Inc.\",\"operator.min.io/license\":\"AGPLv3\",\"operator.min.io/support\":\"https://subnet.min.io\"},\"name\":\"console-sa-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"console-sa-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"console-sa\",\"namespace\":\"minio-operator\"}]}\n",
                    "operator.min.io/authors": "MinIO, Inc.",
                    "operator.min.io/license": "AGPLv3",
                    "operator.min.io/support": "https://subnet.min.io"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "console-sa-binding",
                "resourceVersion": "27393",
                "uid": "6255f879-64f5-4f20-a0ce-2197a2cccb5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console-sa-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-sa",
                    "namespace": "minio-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "create-csrs-for-bootstrapping",
                "resourceVersion": "1508",
                "uid": "95fc5633-4ee8-49a5-8b97-c5e95d2c70db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-bootstrapper"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane\"},\"labels\":{\"app\":\"crossplane\",\"app.kubernetes.io/component\":\"cloud-infrastructure-controller\",\"app.kubernetes.io/instance\":\"crossplane\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"crossplane\",\"app.kubernetes.io/part-of\":\"crossplane\",\"app.kubernetes.io/version\":\"2.2.0\",\"helm.sh/chart\":\"crossplane-2.2.0\"},\"name\":\"crossplane\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crossplane\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"crossplane\",\"namespace\":\"crossplane-system\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:14Z",
                "labels": {
                    "app": "crossplane",
                    "app.kubernetes.io/component": "cloud-infrastructure-controller",
                    "app.kubernetes.io/instance": "crossplane",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "crossplane",
                    "app.kubernetes.io/part-of": "crossplane",
                    "app.kubernetes.io/version": "2.2.0",
                    "helm.sh/chart": "crossplane-2.2.0"
                },
                "name": "crossplane",
                "resourceVersion": "19812",
                "uid": "dd615201-da79-4d8d-991d-d928c1955482"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crossplane"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "crossplane",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane-admin",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane-admin\"},\"labels\":{\"app\":\"crossplane\",\"app.kubernetes.io/component\":\"cloud-infrastructure-controller\",\"app.kubernetes.io/instance\":\"crossplane\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"crossplane\",\"app.kubernetes.io/part-of\":\"crossplane\",\"app.kubernetes.io/version\":\"2.2.0\",\"helm.sh/chart\":\"crossplane-2.2.0\"},\"name\":\"crossplane-admin\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crossplane-admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"crossplane:masters\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:14Z",
                "labels": {
                    "app": "crossplane",
                    "app.kubernetes.io/component": "cloud-infrastructure-controller",
                    "app.kubernetes.io/instance": "crossplane",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "crossplane",
                    "app.kubernetes.io/part-of": "crossplane",
                    "app.kubernetes.io/version": "2.2.0",
                    "helm.sh/chart": "crossplane-2.2.0"
                },
                "name": "crossplane-admin",
                "resourceVersion": "19813",
                "uid": "ceef2d5f-33be-4b8c-8012-df035e8e649a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crossplane-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "crossplane:masters"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane-rbac-manager",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane-rbac-manager\"},\"labels\":{\"app\":\"crossplane\",\"app.kubernetes.io/component\":\"cloud-infrastructure-controller\",\"app.kubernetes.io/instance\":\"crossplane\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"crossplane\",\"app.kubernetes.io/part-of\":\"crossplane\",\"app.kubernetes.io/version\":\"2.2.0\",\"helm.sh/chart\":\"crossplane-2.2.0\"},\"name\":\"crossplane-rbac-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crossplane-rbac-manager\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"rbac-manager\",\"namespace\":\"crossplane-system\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:14Z",
                "labels": {
                    "app": "crossplane",
                    "app.kubernetes.io/component": "cloud-infrastructure-controller",
                    "app.kubernetes.io/instance": "crossplane",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "crossplane",
                    "app.kubernetes.io/part-of": "crossplane",
                    "app.kubernetes.io/version": "2.2.0",
                    "helm.sh/chart": "crossplane-2.2.0"
                },
                "name": "crossplane-rbac-manager",
                "resourceVersion": "19811",
                "uid": "5724d5cb-6d19-4953-8f73-275d07a0432c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crossplane-rbac-manager"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rbac-manager",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:28:44Z",
                "name": "crossplane:provider:provider-kubernetes-f6665ef36536:system",
                "ownerReferences": [
                    {
                        "apiVersion": "pkg.crossplane.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ProviderRevision",
                        "name": "provider-kubernetes-f6665ef36536",
                        "uid": "3e436fd1-ab27-42a5-b572-7b4fbf74377d"
                    }
                ],
                "resourceVersion": "22623",
                "uid": "9df2f41b-2d62-4911-b941-1989e960d89d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crossplane:provider:provider-kubernetes-f6665ef36536:system"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "provider-kubernetes",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:52Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-operator-clusterrole",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1420",
                "uid": "f3f394b6-23d4-4c1d-967c-1cb83710e55a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "csi-snapshot-controller-operator-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-runner-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1493",
                "uid": "ca8348d6-e0da-46cb-abbf-4c6dd55d2d12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-snapshot-controller-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:46Z",
                "name": "custom-account-openshift-machine-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1151",
                "uid": "91e16da3-401a-48ab-8cd4-df3ddeada108"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-config-operator",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "monitoring-workload-custom-kube-state-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-monitoring/custom-kube-state-metrics",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"monitoring-workload-custom-kube-state-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-monitoring/custom-kube-state-metrics\"},\"name\":\"custom-kube-state-metrics\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"custom-kube-state-metrics\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"custom-kube-state-metrics\",\"namespace\":\"appstudio-monitoring\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:26Z",
                "name": "custom-kube-state-metrics",
                "resourceVersion": "20821",
                "uid": "6750562c-d7ea-4163-8f76-363cf29a4a1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "custom-kube-state-metrics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "custom-kube-state-metrics",
                    "namespace": "appstudio-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:24Z",
                "name": "dedicated-admin-serviceaccounts-c0",
                "resourceVersion": "5591",
                "uid": "679f6f61-1de0-4762-8684-a566856b8582"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:25Z",
                "name": "dedicated-admins-c0",
                "resourceVersion": "5609",
                "uid": "a75e2c79-6660-48f5-9545-c0d9a5e4fd7b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:30Z",
                "name": "dedicated-admins-cluster",
                "resourceVersion": "5805",
                "uid": "ff7e112b-428f-4e4d-8555-552ff76a5f9f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:54Z",
                "name": "dedicated-admins-registry-cas-cluster",
                "resourceVersion": "6263",
                "uid": "658f71d8-a0c3-4436-ae9f-059d88810f4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-registry-cas-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:54Z",
                "name": "default-account-cluster-image-registry-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1901",
                "uid": "2bf03381-b806-4794-9ec0-ce11e1c51465"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-image-registry-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-image-registry-operator",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/delete-snapshots",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/delete-snapshots\"},\"name\":\"delete-snapshots\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"delete-snapshots\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "delete-snapshots",
                "resourceVersion": "26609",
                "uid": "fbee94d1-2af2-4b66-a4a1-42a9ff61da16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "delete-snapshots"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:16:01Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "deployment-validation-operator.v0.1.595-gbf89fe8",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-deployment-validation-operator",
                    "olm.permissions.hash": "5skITWrLBOlbXhrBfE3G2s9UbRMxY4Z6yIM4Zm",
                    "operators.coreos.com/deployment-validation-operator.openshift-deployment-validation": ""
                },
                "name": "deployment-validation-op-3MPgHXAhudR419ZBRN97wNgaRvKjiTOnF1Hm8z",
                "resourceVersion": "11239",
                "uid": "b46eca1c-1001-46fc-b5af-9a9b170471bc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "deployment-validation-op-3MPgHXAhudR419ZBRN97wNgaRvKjiTOnF1Hm8z"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:56Z",
                "name": "dns-monitoring",
                "resourceVersion": "2411",
                "uid": "519ce64b-e310-4ff5-bca9-6df14c7fb4ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dns-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "dora-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:dora-metrics/dora-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"dora-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:dora-metrics/dora-metrics-reader\"},\"name\":\"dora-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"dora-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"dora-metrics-exporter-sa\",\"namespace\":\"dora-metrics\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "dora-metrics-reader",
                "resourceVersion": "19354",
                "uid": "5600b074-c6fc-490b-8088-d50b294ddd87"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dora-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dora-metrics-exporter-sa",
                    "namespace": "dora-metrics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:58Z",
                "name": "ebs-csi-main-attacher-binding",
                "resourceVersion": "2774",
                "uid": "55d73e48-512a-413e-86da-7a632967cad1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-attacher-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:59Z",
                "name": "ebs-csi-main-provisioner-binding",
                "resourceVersion": "2902",
                "uid": "33c285c3-767a-41a5-9b05-4550321f5c00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-provisioner-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:01Z",
                "name": "ebs-csi-main-resizer-binding",
                "resourceVersion": "3011",
                "uid": "2801c29c-1846-4ef7-87ff-b822f15170ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-resizer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:00Z",
                "name": "ebs-csi-main-snapshotter-binding",
                "resourceVersion": "2973",
                "uid": "ce60e9c8-85a8-436b-a594-bbaede799df4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-snapshotter-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:59Z",
                "name": "ebs-csi-storageclass-reader-resizer-binding",
                "resourceVersion": "2835",
                "uid": "06c35ea5-2e2b-43a1-a150-3696a333a6d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-resizer-storageclass-reader-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:00Z",
                "name": "ebs-csi-volumesnapshot-reader-provisioner-binding",
                "resourceVersion": "2936",
                "uid": "a563b8b9-070e-4154-b52a-7d5d5c22cb68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-provisioner-volumesnapshot-reader-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:58Z",
                "name": "ebs-node-privileged-binding",
                "resourceVersion": "2787",
                "uid": "aaab9856-a7ac-4595-bf72-b906375c3631"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "ebs-privileged-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-node-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:08Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller",
                "resourceVersion": "24507",
                "uid": "3e835394-4ae4-46dc-9cea-6f5cfc7ff9b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-crossnamespace-subscriber",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-crossnamespace-subscriber\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller-crossnamespace-subscriber\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crossnamespace-subscriber\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:08Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller-crossnamespace-subscriber",
                "resourceVersion": "24514",
                "uid": "0e1b1221-e608-4749-bcee-456ed317cab2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crossnamespace-subscriber"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-manipulator",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-manipulator\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller-manipulator\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"channelable-manipulator\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:08Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller-manipulator",
                "resourceVersion": "24512",
                "uid": "3ee46e8b-50e1-46fd-812d-aa0f0ff123fa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "channelable-manipulator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-resolver",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-resolver\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller-resolver\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"addressable-resolver\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller-resolver",
                "resourceVersion": "24516",
                "uid": "5300a2bc-94b8-480a-96b5-1c67c2ee55a4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "addressable-resolver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-source-observer",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-source-observer\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller-source-observer\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"source-observer\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller-source-observer",
                "resourceVersion": "24503",
                "uid": "461e151c-b582-4ec7-a71a-b87f60dc5581"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "source-observer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-sources-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-sources-controller\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller-sources-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-sources-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller-sources-controller",
                "resourceVersion": "24515",
                "uid": "c1640652-75be-4bf0-85ff-29db7e5a12ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-sources-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-mt-channel-broker-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-mt-channel-broker-controller\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-mt-channel-broker-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-mt-channel-broker-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-mt-channel-broker-controller",
                "resourceVersion": "24517",
                "uid": "4e977485-701e-47d6-ac5e-9d3452b26ffd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-mt-channel-broker-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-webhook\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-webhook\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-webhook\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-webhook",
                "resourceVersion": "24518",
                "uid": "0c816b69-0cd4-459f-896e-c57b24e52dde"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-webhook",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook-podspecable-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook-podspecable-binding\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-webhook-podspecable-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"podspecable-binding\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-webhook\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-webhook-podspecable-binding",
                "resourceVersion": "24526",
                "uid": "242f5eb5-8125-423a-8b18-0bddd7253467"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "podspecable-binding"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-webhook",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook-resolver",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook-resolver\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-webhook-resolver\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"addressable-resolver\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-webhook\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-webhook-resolver",
                "resourceVersion": "24524",
                "uid": "2e154bdc-c4e7-4a9c-a55a-585d147f5fa9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "addressable-resolver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-webhook",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:26:31Z",
                "name": "gitops-service-cluster",
                "ownerReferences": [
                    {
                        "apiVersion": "pipelines.openshift.io/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "GitopsService",
                        "name": "cluster",
                        "uid": "4c7b62e7-e193-4e82-8869-b3cf7b584fb0"
                    }
                ],
                "resourceVersion": "17106",
                "uid": "8f6c1c85-d36e-4447-8cce-fd333fdc6fd2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "gitops-service-cluster"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "gitops-service-cluster",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/grafana-clusterrolebinding",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/grafana-clusterrolebinding\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"labels\":{\"app.kubernetes.io/instance\":\"grafana\",\"app.kubernetes.io/name\":\"grafana\",\"app.kubernetes.io/version\":\"10.4.0\",\"helm.sh/chart\":\"grafana-10.4.0\"},\"name\":\"grafana-clusterrolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"grafana-clusterrole\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"grafana\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:32:05Z",
                "labels": {
                    "app.kubernetes.io/instance": "grafana",
                    "app.kubernetes.io/name": "grafana",
                    "app.kubernetes.io/version": "10.4.0",
                    "helm.sh/chart": "grafana-10.4.0"
                },
                "name": "grafana-clusterrolebinding",
                "resourceVersion": "32982",
                "uid": "8d57c5c0-e0d4-494b-8cd6-8bc0361f7288"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "grafana-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "grafana",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "application-api-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-api/grant-argocd-crd-permissions-for-application-api",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"application-api-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-api/grant-argocd-crd-permissions-for-application-api\"},\"name\":\"grant-argocd-crd-permissions-for-application-api\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crd-manager-for-application-api\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"application-api\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "grant-argocd-crd-permissions-for-application-api",
                "resourceVersion": "26605",
                "uid": "32b50045-2fc5-4fc4-b345-45c0649100df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crd-manager-for-application-api"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "application-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/grant-argocd-crd-permissions-for-has",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/grant-argocd-crd-permissions-for-has\"},\"name\":\"grant-argocd-crd-permissions-for-has\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crd-manager-for-has\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "grant-argocd-crd-permissions-for-has",
                "resourceVersion": "19395",
                "uid": "82ff37ed-f09a-4779-ba9e-5d182b141203"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crd-manager-for-has"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/grant-argocd-crd-permissions-for-integration",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/grant-argocd-crd-permissions-for-integration\"},\"name\":\"grant-argocd-crd-permissions-for-integration\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crd-manager-for-integration\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "grant-argocd-crd-permissions-for-integration",
                "resourceVersion": "26608",
                "uid": "f35bdfca-9eed-412f-ad76-b8b7b74e03ca"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crd-manager-for-integration"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/grant-argocd-crd-permissions-for-project-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/grant-argocd-crd-permissions-for-project-controller\"},\"name\":\"grant-argocd-crd-permissions-for-project-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crd-manager-for-project-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:20Z",
                "name": "grant-argocd-crd-permissions-for-project-controller",
                "resourceVersion": "20183",
                "uid": "8a8f9ab0-ba0e-43f2-94b8-dd4a44583ea1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crd-manager-for-project-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/grant-argocd-crd-permissions-for-release"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "grant-argocd-crd-permissions-for-release",
                "resourceVersion": "22794",
                "uid": "cc238c4d-742c-49a7-9f57-658687590800"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crd-manager-for-release"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"hcco-cluster-admin\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"cluster-admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"User\",\"name\":\"system:hosted-cluster-config\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:04:30Z",
                "name": "hcco-cluster-admin",
                "resourceVersion": "140",
                "uid": "d47f01dc-7c83-4857-b42e-19a7f31167ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:hosted-cluster-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true",
                    "release.openshift.io/create-only": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:58Z",
                "name": "helm-chartrepos-view",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "2721",
                "uid": "9ad85eaa-f0ec-45e4-afb2-7cd65ae1f4bd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "helm-chartrepos-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "hypershift-metrics-client",
                "resourceVersion": "1510",
                "uid": "d9456f01-37ff-41bb-9fad-f5e63b06bed6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:hypershift:prometheus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-maintainers\"},\"name\":\"image-controller-maintainers\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"image-controller-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-build\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:51Z",
                "name": "image-controller-maintainers",
                "resourceVersion": "23097",
                "uid": "abe546ab-d924-446e-83e8-551c016525fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-controller-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-build"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"image-controller\"},\"name\":\"image-controller-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"image-controller-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"image-controller-controller-manager\",\"namespace\":\"image-controller\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:51Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "image-controller"
                },
                "name": "image-controller-manager-rolebinding",
                "resourceVersion": "23099",
                "uid": "dcc9fde7-0883-4eaf-9ac5-cf41f1cb1164"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-controller-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-controller-controller-manager",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-metrics-auth-rolebinding\"},\"name\":\"image-controller-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"image-controller-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"image-controller-controller-manager\",\"namespace\":\"image-controller\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:51Z",
                "name": "image-controller-metrics-auth-rolebinding",
                "resourceVersion": "23096",
                "uid": "b4d6c5d7-bb67-4e0f-9c29-48946bc8d086"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-controller-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-controller-controller-manager",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-rbac-proxy/image-proxy-dex",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-rbac-proxy/image-proxy-dex\"},\"name\":\"image-proxy-dex\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"image-proxy-dex\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"dex\",\"namespace\":\"image-rbac-proxy\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:33Z",
                "name": "image-proxy-dex",
                "resourceVersion": "21460",
                "uid": "408cbdcc-6d00-48bd-ba5d-633d85137ec3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-proxy-dex"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dex",
                    "namespace": "image-rbac-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-rbac-proxy/image-rbac-proxy",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-rbac-proxy/image-rbac-proxy\"},\"name\":\"image-rbac-proxy\"},\"roleRef\":{\"kind\":\"ClusterRole\",\"name\":\"image-rbac-proxy\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"image-rbac-proxy\",\"namespace\":\"image-rbac-proxy\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:33Z",
                "name": "image-rbac-proxy",
                "resourceVersion": "21461",
                "uid": "115e135b-5ed5-4d41-b1a0-bebcccb2e32c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-rbac-proxy"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-rbac-proxy",
                    "namespace": "image-rbac-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-controller\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"imc-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"imc-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"imc-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "imc-controller",
                "resourceVersion": "24535",
                "uid": "ee35f108-b75b-4076-99bf-a6d952a4fae2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "imc-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "imc-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-controller-resolver",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-controller-resolver\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"imc-controller-resolver\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"addressable-resolver\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"imc-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "imc-controller-resolver",
                "resourceVersion": "24539",
                "uid": "e0bafde1-c82d-4668-a4d5-9a8b7647d77a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "addressable-resolver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "imc-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-dispatcher",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-dispatcher\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"imc-dispatcher\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"imc-dispatcher\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"imc-dispatcher\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "imc-dispatcher",
                "resourceVersion": "24531",
                "uid": "16819480-f64d-4843-aa7a-3c7b5f5e8498"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "imc-dispatcher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "imc-dispatcher",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:52Z",
                "name": "insights-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1374",
                "uid": "d8dc750d-c136-4faf-b887-12c0ab9a9ade"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:36Z",
                "name": "insights-operator-auth",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "754",
                "uid": "a85dce51-328c-4246-838b-429bc35a02b1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "name": "insights-operator-gather",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1511",
                "uid": "540c9b4c-ec8a-4b1d-ad8e-5e40a27e49e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "insights-operator-gather"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "gather",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "name": "insights-operator-gather-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1700",
                "uid": "808e67da-e31a-4289-88ec-5fcbfecb3b1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "gather",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "policies-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-policies/integration-kyverno-background:konflux-integration-runner"
                },
                "creationTimestamp": "2026-04-24T21:34:13Z",
                "name": "integration-kyverno-background:konflux-integration-runner",
                "resourceVersion": "37207",
                "uid": "8bc52c1f-2bea-4629-ac41-f1bb06d57162"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-manager-rolebinding\"},\"name\":\"integration-service-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"integration-service-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-controller-manager\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "integration-service-manager-rolebinding",
                "resourceVersion": "26618",
                "uid": "989bd831-47a5-489b-a960-1ce11f8fe0f8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "integration-service-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-metrics-auth-rolebinding\"},\"name\":\"integration-service-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"integration-service-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-controller-manager\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "integration-service-metrics-auth-rolebinding",
                "resourceVersion": "26613",
                "uid": "a3d329d4-fa55-43fa-8560-c48997f19f40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "integration-service-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-prometheus-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-prometheus-role-binding\"},\"name\":\"integration-service-prometheus-role-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"integration-service-prometheus-viewer-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-metrics-reader\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "integration-service-prometheus-role-binding",
                "resourceVersion": "26621",
                "uid": "56fa25c1-ebec-4089-ab2e-491c6a48bfc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "integration-service-prometheus-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-metrics-reader",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-snapshot-garbage-collector",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-snapshot-garbage-collector\"},\"name\":\"integration-service-snapshot-garbage-collector\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"integration-service-snapshot-garbage-collector\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-snapshot-garbage-collector\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "integration-service-snapshot-garbage-collector",
                "resourceVersion": "26615",
                "uid": "fcead4cd-ec0a-451b-8a82-69bc636da251"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "integration-service-snapshot-garbage-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-snapshot-garbage-collector",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-tekton-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-tekton-role-binding\"},\"name\":\"integration-service-tekton-role-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"integration-service-tekton-editor-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-controller-manager\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "integration-service-tekton-role-binding",
                "resourceVersion": "26612",
                "uid": "3b0845da-84bb-42a7-9789-3ec2a19324ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "integration-service-tekton-editor-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "internal-services-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:internal-services/internal-service-request-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"internal-services-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:internal-services/internal-service-request-role-binding\"},\"name\":\"internal-service-request-role-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"internal-service-request-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"internal-service-request-service-account\",\"namespace\":\"internal-services\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:08Z",
                "name": "internal-service-request-role-binding",
                "resourceVersion": "24411",
                "uid": "543ab4e5-a5d8-4391-a71b-61dc8cf0df1f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "internal-service-request-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "internal-service-request-service-account",
                    "namespace": "internal-services"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "internal-services-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:internal-services/internal-services",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"internal-services-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:internal-services/internal-services\"},\"name\":\"internal-services\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"internal-service-request-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-release-team\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:08Z",
                "name": "internal-services",
                "resourceVersion": "24409",
                "uid": "86545cfb-6212-4af6-a8ac-168b50653eac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "internal-service-request-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-release-team"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-job-sink",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-job-sink\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"knative-eventing-job-sink\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-job-sink\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"job-sink\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "knative-eventing-job-sink",
                "resourceVersion": "24523",
                "uid": "0a11f267-c9b0-4086-8f1c-b6d988abec69"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-job-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "job-sink",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-mt-broker-filter",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-mt-broker-filter\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"knative-eventing-mt-broker-filter\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-mt-broker-filter\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mt-broker-filter\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "knative-eventing-mt-broker-filter",
                "resourceVersion": "24530",
                "uid": "1a4ebc5c-0541-4e07-a596-3f5831e69dc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-mt-broker-filter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mt-broker-filter",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-mt-broker-ingress",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-mt-broker-ingress\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"knative-eventing-mt-broker-ingress\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-mt-broker-ingress\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mt-broker-ingress\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "knative-eventing-mt-broker-ingress",
                "resourceVersion": "24527",
                "uid": "27bb6d17-3758-4845-ac8f-d4186ffb3f2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-mt-broker-ingress"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mt-broker-ingress",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-pingsource-mt-adapter",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-pingsource-mt-adapter\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"knative-eventing-pingsource-mt-adapter\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-pingsource-mt-adapter\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pingsource-mt-adapter\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:09Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "knative-eventing-pingsource-mt-adapter",
                "resourceVersion": "24536",
                "uid": "cd69a66d-2ef6-40d8-b86d-0b78a854d092"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-pingsource-mt-adapter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pingsource-mt-adapter",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "konflux-kite-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kite/konflux-kite-authorizer",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"konflux-kite-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kite/konflux-kite-authorizer\"},\"name\":\"konflux-kite-authorizer\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"konflux-kite-authorizer\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-kite\",\"namespace\":\"konflux-kite\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:38Z",
                "name": "konflux-kite-authorizer",
                "resourceVersion": "21845",
                "uid": "55aaf413-6a1f-4371-b7dc-516d927eadbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-kite-authorizer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-kite",
                    "namespace": "konflux-kite"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kyverno/konflux-kyverno:admission-controller"
                },
                "creationTimestamp": "2026-04-24T21:31:35Z",
                "labels": {
                    "app.kubernetes.io/component": "admission-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:admission-controller",
                "resourceVersion": "31838",
                "uid": "5cbc6da6-ba46-4230-958c-a3f7c6762e19"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-kyverno:admission-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-admission-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kyverno/konflux-kyverno:admission-controller:view"
                },
                "creationTimestamp": "2026-04-24T21:31:35Z",
                "labels": {
                    "app.kubernetes.io/component": "admission-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:admission-controller:view",
                "resourceVersion": "31839",
                "uid": "ae9fa4db-3eee-4b1d-bc5c-d1ce4fdccb84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-admission-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kyverno/konflux-kyverno:background-controller"
                },
                "creationTimestamp": "2026-04-24T21:31:35Z",
                "labels": {
                    "app.kubernetes.io/component": "background-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:background-controller",
                "resourceVersion": "31835",
                "uid": "ea94e837-3094-4715-ad5d-7e6b1bed6fc1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-kyverno:background-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kyverno/konflux-kyverno:background-controller:view"
                },
                "creationTimestamp": "2026-04-24T21:31:35Z",
                "labels": {
                    "app.kubernetes.io/component": "background-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:background-controller:view",
                "resourceVersion": "31829",
                "uid": "e1417585-625e-4d42-b92a-b2080a974da6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kyverno/konflux-kyverno:cleanup-controller"
                },
                "creationTimestamp": "2026-04-24T21:31:35Z",
                "labels": {
                    "app.kubernetes.io/component": "cleanup-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:cleanup-controller",
                "resourceVersion": "31831",
                "uid": "9674364e-f538-400c-a10b-51b8416adff1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-kyverno:cleanup-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-cleanup-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "policies-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-policies/konflux-rbac-kyverno-background:konflux-viewer-user-actions-support"
                },
                "creationTimestamp": "2026-04-24T21:34:13Z",
                "name": "konflux-rbac-kyverno-background:konflux-viewer-user-actions-support",
                "resourceVersion": "37208",
                "uid": "22d86ef0-40ef-4c4f-af55-389946641329"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-viewer-user-actions"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "monitoring-workload-prometheus-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-workload-monitoring/kube-rbac-proxy",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"monitoring-workload-prometheus-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-workload-monitoring/kube-rbac-proxy\"},\"name\":\"kube-rbac-proxy\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kube-rbac-proxy\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"kube-rbac-proxy\",\"namespace\":\"dummy-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:23Z",
                "name": "kube-rbac-proxy",
                "resourceVersion": "20522",
                "uid": "ff9f9c4b-b635-4729-82ba-d12414ca5b65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kube-rbac-proxy"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-rbac-proxy",
                    "namespace": "dummy-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:16:05Z",
                "labels": {
                    "app.kubernetes.io/component": "exporter",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "kube-state-metrics",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.13.0"
                },
                "name": "kube-state-metrics",
                "resourceVersion": "11313",
                "uid": "f22c93d5-2028-4618-bcd9-3ac83e8e9412"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kube-state-metrics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-state-metrics",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-api-server",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-api-server\"},\"labels\":{\"app.kubernetes.io/component\":\"api-server\",\"app.kubernetes.io/name\":\"kubearchive-api-server\",\"app.kubernetes.io/part-of\":\"kubearchive\",\"app.kubernetes.io/version\":\"v1.21.3\"},\"name\":\"kubearchive-api-server\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kubearchive-api-server\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"kubearchive-api-server\",\"namespace\":\"product-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:31:19Z",
                "labels": {
                    "app.kubernetes.io/component": "api-server",
                    "app.kubernetes.io/name": "kubearchive-api-server",
                    "app.kubernetes.io/part-of": "kubearchive",
                    "app.kubernetes.io/version": "v1.21.3"
                },
                "name": "kubearchive-api-server",
                "resourceVersion": "30817",
                "uid": "7d231eb7-0b69-451f-afe2-a46165a773e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-api-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-api-server",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-maintainers\"},\"name\":\"kubearchive-maintainers\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kubearchive-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:31:19Z",
                "name": "kubearchive-maintainers",
                "resourceVersion": "30816",
                "uid": "24143a93-35a2-44f1-abb9-98ab96367c03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-operator",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-operator\"},\"labels\":{\"app.kubernetes.io/component\":\"operator\",\"app.kubernetes.io/name\":\"kubearchive-operator\",\"app.kubernetes.io/part-of\":\"kubearchive\",\"app.kubernetes.io/version\":\"v1.21.3\"},\"name\":\"kubearchive-operator\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kubearchive-operator\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"kubearchive-operator\",\"namespace\":\"product-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:31:19Z",
                "labels": {
                    "app.kubernetes.io/component": "operator",
                    "app.kubernetes.io/name": "kubearchive-operator",
                    "app.kubernetes.io/part-of": "kubearchive",
                    "app.kubernetes.io/version": "v1.21.3"
                },
                "name": "kubearchive-operator",
                "resourceVersion": "30820",
                "uid": "db5280df-2613-4dbd-9466-bcc34b37e9d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-operator",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-otel-collector-auth-delegator",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-otel-collector-auth-delegator\"},\"name\":\"kubearchive-otel-collector-auth-delegator\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"system:auth-delegator\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"kubearchive-otel-collector\",\"namespace\":\"product-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:31:19Z",
                "name": "kubearchive-otel-collector-auth-delegator",
                "resourceVersion": "30818",
                "uid": "3dc58ee2-e7c5-414f-883b-da887fc37316"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-otel-collector",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:31:37Z",
                "name": "kubearchive-sinkfilter",
                "resourceVersion": "31969",
                "uid": "e74abc90-b053-4337-b03e-49ea0fe61ca1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-sinkfilter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-operator",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/hook": "PreSync",
                    "argocd.argoproj.io/hook-delete-policy": "BeforeHookCreation",
                    "argocd.argoproj.io/tracking-id": "policies-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-policies/kueue-crd-checker"
                },
                "creationTimestamp": "2026-04-24T21:34:02Z",
                "name": "kueue-crd-checker",
                "resourceVersion": "36883",
                "uid": "b925bbc6-dc00-4efb-92f5-e507898cf38e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-crd-checker"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-crd-checker",
                    "namespace": "konflux-policies"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:32:25Z",
                "labels": {
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-manager-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "4fd69ae2-99e4-46aa-82b1-03711e0ad1d2"
                    }
                ],
                "resourceVersion": "34518",
                "uid": "6b4f44c4-d424-4f6c-86c1-fb81d9d6a9be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:32:26Z",
                "labels": {
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-metrics-auth-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "4fd69ae2-99e4-46aa-82b1-03711e0ad1d2"
                    }
                ],
                "resourceVersion": "34547",
                "uid": "fb197ff8-a698-4331-945a-774130fd466c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:32:06Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-metrics-monitoring-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "4fd69ae2-99e4-46aa-82b1-03711e0ad1d2"
                    }
                ],
                "resourceVersion": "33013",
                "uid": "943627eb-2683-4456-921f-e7d0a8891335"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus",
                    "namespace": "openshift-monitoring"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-monitoring"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:32:26Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-metrics-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "4fd69ae2-99e4-46aa-82b1-03711e0ad1d2"
                    }
                ],
                "resourceVersion": "34531",
                "uid": "0617a97f-cb2f-4677-bfa2-a4c4d22a3019"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:32:24Z",
                "name": "kueue-openshift-cluster-role-binding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "4fd69ae2-99e4-46aa-82b1-03711e0ad1d2"
                    }
                ],
                "resourceVersion": "34448",
                "uid": "48868c04-920a-4b69-93dc-8545a8dca8c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-openshift-roles"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:30:30Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "kueue-operator.v1.2.0",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-kueue-operator",
                    "olm.permissions.hash": "42hVcmyATQtNeAOvvAsvLqdgqOPtcPE9wjF6jD",
                    "operators.coreos.com/kueue-operator.openshift-kueue-operator": ""
                },
                "name": "kueue-operator.v1.2.0-bk2unD9fWkRGV2ibWaI05ZVfXD2qXTCJ8yswuZ",
                "resourceVersion": "29160",
                "uid": "4168c777-4ade-40b0-93a0-6bb4b21d1623"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-operator.v1.2.0-bk2unD9fWkRGV2ibWaI05ZVfXD2qXTCJ8yswuZ"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-kueue-operator",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:30:31Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "kueue-operator.v1.2.0",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-kueue-operator",
                    "olm.permissions.hash": "bUMY0gTfa7rNVxux2NYtoaAuyLWWJpLNHjWRKp",
                    "operators.coreos.com/kueue-operator.openshift-kueue-operator": ""
                },
                "name": "kueue-operator.v1.2.0-op-77yGYZPVf2uU3xFbuW447JQKzE98BMGk8As0St",
                "resourceVersion": "28793",
                "uid": "b8f9d521-5362-4aa9-81c5-906d79c7d5b8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-operator.v1.2.0-op-77yGYZPVf2uU3xFbuW447JQKzE98BMGk8As0St"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-kueue-operator",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:32:25Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-proxy-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "4fd69ae2-99e4-46aa-82b1-03711e0ad1d2"
                    }
                ],
                "resourceVersion": "34489",
                "uid": "59ffce67-a0a0-432b-b240-e18243e6ea99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-proxy-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/loki-clusterrolebinding",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/loki-clusterrolebinding\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"labels\":{\"app.kubernetes.io/instance\":\"loki\",\"app.kubernetes.io/name\":\"loki\",\"app.kubernetes.io/version\":\"3.6.3\",\"helm.sh/chart\":\"loki-6.49.0\"},\"name\":\"loki-clusterrolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"loki-clusterrole\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"loki\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:32:05Z",
                "labels": {
                    "app.kubernetes.io/instance": "loki",
                    "app.kubernetes.io/name": "loki",
                    "app.kubernetes.io/version": "3.6.3",
                    "helm.sh/chart": "loki-6.49.0"
                },
                "name": "loki-clusterrolebinding",
                "resourceVersion": "32980",
                "uid": "f073cb90-d0dc-41c5-bae0-d6532e17c0f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "loki-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "loki",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/manage-integrationtestscenarios",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/manage-integrationtestscenarios\"},\"name\":\"manage-integrationtestscenarios\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"manage-integrationtestscenarios\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "manage-integrationtestscenarios",
                "resourceVersion": "26622",
                "uid": "5c918605-6b9c-4c0d-9815-d6405eac5ed0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "manage-integrationtestscenarios"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/manage-resolutionrequests",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/manage-resolutionrequests\"},\"name\":\"manage-resolutionrequests\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"manage-resolutionrequests\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "manage-resolutionrequests",
                "resourceVersion": "26631",
                "uid": "44fee757-a0ee-4ef1-8496-cb53ca948da4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "manage-resolutionrequests"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:19Z",
                "name": "metrics-daemon-sa-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3703",
                "uid": "ea7bb1d2-a980-4c04-98f3-138548357b24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "metrics-daemon-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-daemon-sa",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:16:06Z",
                "labels": {
                    "app.kubernetes.io/component": "metrics-server",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "auth-delegator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "metrics-server:system:auth-delegator",
                "resourceVersion": "11422",
                "uid": "20439f1f-4017-4ac1-8d2e-802cfd8ef506"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/minio-operator-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/minio-operator-binding\",\"operator.min.io/authors\":\"MinIO, Inc.\",\"operator.min.io/license\":\"AGPLv3\",\"operator.min.io/support\":\"https://subnet.min.io\"},\"name\":\"minio-operator-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"minio-operator-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"minio-operator\",\"namespace\":\"minio-operator\"}]}\n",
                    "operator.min.io/authors": "MinIO, Inc.",
                    "operator.min.io/license": "AGPLv3",
                    "operator.min.io/support": "https://subnet.min.io"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "minio-operator-binding",
                "resourceVersion": "27395",
                "uid": "a08cbd67-4214-475f-9118-71fae0dcd32e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "minio-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "minio-operator",
                    "namespace": "minio-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "mintmaker-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:mintmaker/mintmaker-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"mintmaker-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:mintmaker/mintmaker-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"mintmaker\"},\"name\":\"mintmaker-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"mintmaker-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mintmaker-controller-manager\",\"namespace\":\"mintmaker\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:18Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "mintmaker"
                },
                "name": "mintmaker-manager-rolebinding",
                "resourceVersion": "25744",
                "uid": "e26e885a-b788-4a7b-8b5e-1bea5c9ee0b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "mintmaker-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mintmaker-controller-manager",
                    "namespace": "mintmaker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "mintmaker-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:mintmaker/mintmaker-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"mintmaker-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:mintmaker/mintmaker-metrics-auth-rolebinding\"},\"name\":\"mintmaker-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"mintmaker-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mintmaker-controller-manager\",\"namespace\":\"mintmaker\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:18Z",
                "name": "mintmaker-metrics-auth-rolebinding",
                "resourceVersion": "25741",
                "uid": "33ea4eb8-3af9-4c8f-863d-db24c034503e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "mintmaker-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mintmaker-controller-manager",
                    "namespace": "mintmaker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/modify-pipelineruns-taskruns",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/modify-pipelineruns-taskruns\"},\"name\":\"modify-pipelineruns-taskruns\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"modify-pipelineruns-taskruns\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "name": "modify-pipelineruns-taskruns",
                "resourceVersion": "26625",
                "uid": "8ac9a253-2057-4567-b9aa-3c5ea788a061"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "modify-pipelineruns-taskruns"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/multi-platform-controller-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/multi-platform-controller-manager-rolebinding\"},\"labels\":{\"app\":\"multi-platform-controller\"},\"name\":\"multi-platform-controller-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"multi-platform-controller-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"multi-platform-controller-controller-manager\",\"namespace\":\"multi-platform-controller\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:31:45Z",
                "labels": {
                    "app": "multi-platform-controller"
                },
                "name": "multi-platform-controller-manager-rolebinding",
                "resourceVersion": "32361",
                "uid": "d9e9385d-8f3c-42a8-9e48-9382015d4079"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multi-platform-controller-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multi-platform-controller-controller-manager",
                    "namespace": "multi-platform-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/multi-platform-controller-proxy-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/multi-platform-controller-proxy-rolebinding\"},\"labels\":{\"app\":\"multi-platform-controller\"},\"name\":\"multi-platform-controller-proxy-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"multi-platform-controller-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"multi-platform-controller-controller-manager\",\"namespace\":\"multi-platform-controller\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:31:45Z",
                "labels": {
                    "app": "multi-platform-controller"
                },
                "name": "multi-platform-controller-proxy-rolebinding",
                "resourceVersion": "32358",
                "uid": "f70636f2-ebd5-4fbd-bab5-4e9ed38b3df9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multi-platform-controller-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multi-platform-controller-controller-manager",
                    "namespace": "multi-platform-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:20Z",
                "name": "multus-admission-controller-webhook",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3797",
                "uid": "04cac869-5ed6-4e11-86a7-bba9f0aa09b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-admission-controller-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ac",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:16Z",
                "name": "multus-ancillary-tools",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3644",
                "uid": "43849c58-9c6c-4906-815f-498a0ac75e42"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-ancillary-tools"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:16Z",
                "name": "multus-cluster-readers",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3646",
                "uid": "cb43edde-944a-4eaa-b708-d19ac25f92f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-ancillary-tools"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:cluster-readers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:15Z",
                "name": "multus-group",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3634",
                "uid": "05d9eedb-9b3f-4c76-bb78-48fdc7a1fb5c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:15Z",
                "name": "multus-transient",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3629",
                "uid": "d5530cac-4c7b-49a7-a985-1da0f3692ea8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-ancillary-tools"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:16Z",
                "name": "multus-whereabouts",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3649",
                "uid": "405ca3fe-5e3b-44d1-8e7d-b2bfd4d0c984"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "whereabouts-cni"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/namespace-claim-cleaner",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/namespace-claim-cleaner\"},\"name\":\"namespace-claim-cleaner\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"namespace-claim-cleaner\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"namespace-claim-cleaner\",\"namespace\":\"crossplane-system\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:40Z",
                "name": "namespace-claim-cleaner",
                "resourceVersion": "22023",
                "uid": "1b0367c1-be7d-4ce4-b3f6-a2ee36068e3b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "namespace-claim-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-claim-cleaner",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:30Z",
                "name": "network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "4047",
                "uid": "03acc61e-d9ca-4520-9908-79230cf77c88"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "network-diagnostics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:32Z",
                "name": "network-node-identity",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "4090",
                "uid": "366e1c64-c35f-45ad-878c-65d973a165f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "network-node-identity"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-node-identity",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:16:05Z",
                "labels": {
                    "app.kubernetes.io/component": "exporter",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "node-exporter",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "1.8.2"
                },
                "name": "node-exporter",
                "resourceVersion": "11310",
                "uid": "e2fabd3f-06f7-475c-b141-1dd79bedb318"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "node-exporter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-exporter",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:07Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "oadp-operator.v1.4.9",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-adp",
                    "olm.permissions.hash": "53Dxlas9kwJWPvCzV4LmVPTp0yaamAhjOi3Ejj",
                    "operators.coreos.com/redhat-oadp-operator.openshift-adp": ""
                },
                "name": "oadp-operator.v1.4.9-25YSSVpFw55rWAuyswAk0IvXHaVEpEezWdwWks",
                "resourceVersion": "24408",
                "uid": "c844fd0a-5a04-458b-8b4e-7199290f76e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "oadp-operator.v1.4.9-25YSSVpFw55rWAuyswAk0IvXHaVEpEezWdwWks"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-adp-controller-manager",
                    "namespace": "openshift-adp"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:29:05Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "oadp-operator.v1.4.9",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-adp",
                    "olm.permissions.hash": "39jMkY8WxClFdoJvin8PMbEIsuS6GkzOl6l6oP",
                    "operators.coreos.com/redhat-oadp-operator.openshift-adp": ""
                },
                "name": "oadp-operator.v1.4.9-czOPdaX3elVKXRkPgSnp9lNhcTqLi9z3pDVyJC",
                "resourceVersion": "24432",
                "uid": "c087ca5d-5e07-45c4-890c-831c12288eef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "oadp-operator.v1.4.9-czOPdaX3elVKXRkPgSnp9lNhcTqLi9z3pDVyJC"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "velero",
                    "namespace": "openshift-adp"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:20Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2psomt13itcoqvhn53h408vdr189m59v"
                },
                "name": "open-cluster-management:klusterlet-2psomt13itcoqvhn53h408vdr189m59v-registration:addon-management",
                "resourceVersion": "3771",
                "uid": "f3506038-e3cc-4238-a26f-074fd699133c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2psomt13itcoqvhn53h408vdr189m59v-registration:addon-management"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2psomt13itcoqvhn53h408vdr189m59v-registration-sa",
                    "namespace": "open-cluster-management-2psomt13itcoqvhn53h408vdr189m59v"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:20Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2psomt13itcoqvhn53h408vdr189m59v"
                },
                "name": "open-cluster-management:klusterlet-2psomt13itcoqvhn53h408vdr189m59v-registration:agent",
                "resourceVersion": "3768",
                "uid": "8a94ab92-1985-46ac-9054-32c5b134a48a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2psomt13itcoqvhn53h408vdr189m59v-registration:agent"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2psomt13itcoqvhn53h408vdr189m59v-registration-sa",
                    "namespace": "open-cluster-management-2psomt13itcoqvhn53h408vdr189m59v"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:20Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2psomt13itcoqvhn53h408vdr189m59v"
                },
                "name": "open-cluster-management:klusterlet-2psomt13itcoqvhn53h408vdr189m59v-work:agent",
                "resourceVersion": "3800",
                "uid": "973abf3f-e36d-40d8-82d8-bdf63fb4e259"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2psomt13itcoqvhn53h408vdr189m59v-work:agent"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2psomt13itcoqvhn53h408vdr189m59v-work-sa",
                    "namespace": "open-cluster-management-2psomt13itcoqvhn53h408vdr189m59v"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:21Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2psomt13itcoqvhn53h408vdr189m59v"
                },
                "name": "open-cluster-management:klusterlet-2psomt13itcoqvhn53h408vdr189m59v-work:aggregate",
                "resourceVersion": "3827",
                "uid": "9ba97032-9394-4fbd-89e8-28b027dfeae7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2psomt13itcoqvhn53h408vdr189m59v-work:aggregate"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2psomt13itcoqvhn53h408vdr189m59v-work-sa",
                    "namespace": "open-cluster-management-2psomt13itcoqvhn53h408vdr189m59v"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:21Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2psomt13itcoqvhn53h408vdr189m59v"
                },
                "name": "open-cluster-management:klusterlet-2psomt13itcoqvhn53h408vdr189m59v-work:execution-admin",
                "resourceVersion": "3840",
                "uid": "f7404a79-3ae6-4bf7-8f97-fb62e5751a24"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2psomt13itcoqvhn53h408vdr189m59v-work-sa",
                    "namespace": "open-cluster-management-2psomt13itcoqvhn53h408vdr189m59v"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:02Z",
                "name": "openshift-backplane-managed-scripts-reader",
                "resourceVersion": "5096",
                "uid": "16be392e-cd83-4f8e-b6a3-5866dc020d4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-backplane-managed-scripts-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:44Z",
                "name": "openshift-csi-snapshot-controller-role",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1096",
                "uid": "57ab9e1a-2a9b-4d38-8bbe-7d0155bf9dc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-snapshot-controller-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:45Z",
                "name": "openshift-dns",
                "resourceVersion": "1119",
                "uid": "02abb240-b806-4b42-8c61-0899c101e623"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-dns"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:40Z",
                "name": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "924",
                "uid": "c1f4425d-b12b-4052-9207-34f1be71d8a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-dns-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns-operator",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-gitops-apply-tekton-config-parameters",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-gitops-apply-tekton-config-parameters\"},\"name\":\"openshift-gitops-apply-tekton-config-parameters\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"openshift-gitops-apply-tekton-config-parameters\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "openshift-gitops-apply-tekton-config-parameters",
                "resourceVersion": "27384",
                "uid": "8f2ae21a-136f-4bed-b8f7-4ef40f38f1d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-apply-tekton-config-parameters"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-gitops-jobs-admin",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-gitops-jobs-admin\"},\"name\":\"openshift-gitops-jobs-admin\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"openshift-gitops-jobs-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "openshift-gitops-jobs-admin",
                "resourceVersion": "27383",
                "uid": "8ec54998-b5e1-43ed-b86e-72365eee120c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-jobs-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-04-24T21:26:32Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-openshift-gitops-argocd-application-controller",
                "resourceVersion": "17260",
                "uid": "82522bef-c65f-4d02-bd36-d8e67e4b0ff7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-04-24T21:26:33Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-applicationset-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-openshift-gitops-argocd-applicationset-controller",
                "resourceVersion": "17393",
                "uid": "097b6281-b3b4-4307-876d-cc5253850c8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-openshift-gitops-argocd-applicationset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-applicationset-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-04-24T21:26:32Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-openshift-gitops-argocd-server",
                "resourceVersion": "17263",
                "uid": "56dd70f7-5298-456e-bbba-bf252bff06e2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:26:25Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.15.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "6KhHPV4xyDt614G88n3r92FxOjlGE53yyaLtC",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operato-5yq98q77b9Ijrzm2ucW0rzIgBCWF42EnzNx6WI",
                "resourceVersion": "16978",
                "uid": "44ba0440-7951-474f-86eb-8e6178bf27b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-operato-5yq98q77b9Ijrzm2ucW0rzIgBCWF42EnzNx6WI"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:26:26Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.15.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operator-controller-manager-service-system:auth-delegator",
                "resourceVersion": "16971",
                "uid": "6a53888c-ebfb-40cb-b77d-fc12058054d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:26:25Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.15.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "7TodAPaPk0LP0B3auCAWFJXqzxwHD6s6z4IB5m",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operator-l8lwYPxActw8L0jc3vZqHq5fdyydGaKqEBwMY",
                "resourceVersion": "17372",
                "uid": "f357f5c3-3c2b-4fa0-b3cb-aa0da1d11257"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-operator-l8lwYPxActw8L0jc3vZqHq5fdyydGaKqEBwMY"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "imageregistry.operator.openshift.io/checksum": "sha256:9c18924fae4eab4651205fc268268a67bd4b9025164b242656ab8e009955b634"
                },
                "creationTimestamp": "2026-04-24T21:05:55Z",
                "name": "openshift-image-registry-pruner",
                "resourceVersion": "2363",
                "uid": "8bbb1d5a-68a4-44d0-8cd9-eddba72808fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-pruner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pruner",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:50Z",
                "name": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1287",
                "uid": "aab24563-b586-45fe-b7bf-9dfc6324790e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:03Z",
                "name": "openshift-ingress-router",
                "resourceVersion": "3063",
                "uid": "82c5ef4a-76b6-402a-a0ad-0a98a92512c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ingress-router"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "router",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:34Z",
                "name": "openshift-iptables-alerter",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "4119",
                "uid": "bdcd304b-a3ab-4343-8e17-996fc0fd5399"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-iptables-alerter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "iptables-alerter",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-minio-apply-tenants",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-minio-apply-tenants\"},\"name\":\"openshift-minio-apply-tenants\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"openshift-minio-apply-tenants\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "openshift-minio-apply-tenants",
                "resourceVersion": "27385",
                "uid": "4896d893-1baf-4807-bd38-360dfc3b74a8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-minio-apply-tenants"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:25Z",
                "name": "openshift-ovn-kubernetes-control-plane-limited",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3926",
                "uid": "1ab40089-7e68-4026-ad18-3be5a5be1593"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ovn-kubernetes-control-plane-limited"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-control-plane",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:24Z",
                "name": "openshift-ovn-kubernetes-node-identity-limited",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3906",
                "uid": "b2eb153c-4bde-4ac8-a447-bc5ff1d34948"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ovn-kubernetes-node-limited"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:ovn-nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:24Z",
                "name": "openshift-ovn-kubernetes-node-kube-rbac-proxy",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "d9bba585-3b23-4c3d-88d9-6a5b35832225"
                    }
                ],
                "resourceVersion": "3912",
                "uid": "31e9f2f0-f470-4c6f-ac5c-732cc55a3ce8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ovn-kubernetes-kube-rbac-proxy"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-node",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:30:43Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v5.0.5-806",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "9bJ2hLvRLSWpRC8Ie37vQVFfzlNRl2vkaudFPt",
                    "operators.coreos.com/openshift-pipelines-operator-rh.openshift-operators": ""
                },
                "name": "openshift-pipelines-oper-1g1VHWCRbHXrmwfL8WoZLkWJztmNAj10iQXwKs",
                "resourceVersion": "30453",
                "uid": "19207536-f909-447c-a243-0d98a0afc744"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-pipelines-oper-1g1VHWCRbHXrmwfL8WoZLkWJztmNAj10iQXwKs"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-pipelines-operator",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "aece554f4c5c48e80f7bb8504fd3b9b799e87fe4da4980fcd2fab7cc1ee101ec"
                },
                "creationTimestamp": "2026-04-24T21:31:28Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "openshift-pipelines-permission",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-hf44r",
                        "uid": "6d20ef87-cd98-4ff8-96aa-924dc04dcaf3"
                    }
                ],
                "resourceVersion": "31297",
                "uid": "c40dc8e0-c844-4c8a-b24a-c5f3527a43c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:16:05Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "openshift-state-metrics",
                "resourceVersion": "11311",
                "uid": "bcd23b60-4278-4180-a529-2bf115bcd251"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-state-metrics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-state-metrics",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:51Z",
                "name": "osd-cluster-admin",
                "resourceVersion": "6195",
                "uid": "70d62de1-20df-4d22-ba5d-f1e24f4c84ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "cluster-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:22Z",
                "name": "osd-delete-backplane-script-resources",
                "resourceVersion": "5489",
                "uid": "c1daf483-4a41-4a18-9d03-249e0d09bc86"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-script-resources"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "osd-backplane",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:07:56Z",
                "name": "osd-delete-backplane-serviceaccounts-c0",
                "resourceVersion": "4887",
                "uid": "5e9877cb-2a42-486d-8fda-9cbbcca8c47c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-get-namespace"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:08:29Z",
                "name": "pcap-dedicated-admins",
                "resourceVersion": "5754",
                "uid": "29b71ac5-1143-4a43-879b-149f3fbca504"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pcap-dedicated-admins"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:perf-team-prometheus-reader/perf-team-prometheus-reader-oomcrash-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:perf-team-prometheus-reader/perf-team-prometheus-reader-oomcrash-binding\"},\"name\":\"perf-team-prometheus-reader-oomcrash-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"perf-team-prometheus-reader-oomcrash-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"perf-team-prometheus-reader-oomcrash-sa\",\"namespace\":\"perf-team-prometheus-reader\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:26Z",
                "name": "perf-team-prometheus-reader-oomcrash-binding",
                "resourceVersion": "20814",
                "uid": "0629eeb1-9efb-4e2a-aa7e-a9ba4e1c591d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "perf-team-prometheus-reader-oomcrash-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "perf-team-prometheus-reader-oomcrash-sa",
                    "namespace": "perf-team-prometheus-reader"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-exporter-reader-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-exporter-reader-binding\"},\"name\":\"pipeline-service-exporter-reader-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"pipeline-service-exporter-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipeline-service-exporter\",\"namespace\":\"openshift-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "pipeline-service-exporter-reader-binding",
                "resourceVersion": "27390",
                "uid": "a3d653e8-c22c-4524-b5bc-7882ba350573"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-service-exporter-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline-service-exporter",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-exporter-resolution-req-read-until-ocp-at-415",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-exporter-resolution-req-read-until-ocp-at-415\"},\"name\":\"pipeline-service-exporter-resolution-req-read-until-ocp-at-415\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"pipeline-service-exporter-resolution-req-read-until-ocp-at-415\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipeline-service-exporter\",\"namespace\":\"openshift-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "pipeline-service-exporter-resolution-req-read-until-ocp-at-415",
                "resourceVersion": "27392",
                "uid": "e21b4e02-a1f4-4222-82cd-e2277a935607"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-service-exporter-resolution-req-read-until-ocp-at-415"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline-service-exporter",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-sre",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-sre\"},\"name\":\"pipeline-service-sre\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"pipeline-service-sre\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-pipeline-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "pipeline-service-sre",
                "resourceVersion": "27396",
                "uid": "d5952fe3-9cf8-400a-b6f3-c3a20785067f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-service-sre"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-pipeline-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "ae918f20c964c59e96a1cb0326294b52e6eb38f742405a9102ff4cfbcb3154fd"
                },
                "creationTimestamp": "2026-04-24T21:33:31Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.43.0",
                    "operator.tekton.dev/operand-name": "openshift-pipeline-as-code"
                },
                "name": "pipelines-as-code-controller-clusterbinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-f7lr7",
                        "uid": "c77cd7f3-3d6c-4359-bcc8-211680dde82c"
                    }
                ],
                "resourceVersion": "36066",
                "uid": "5763fdf9-b54b-4142-88de-0b4d8075403e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-as-code-controller-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "bdfe0db42f34c12ed9749d40e7c134b5945cf44b993708b8e5f212bba3396473"
                },
                "creationTimestamp": "2026-04-24T21:33:31Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.43.0",
                    "operator.tekton.dev/operand-name": "openshift-pipeline-as-code"
                },
                "name": "pipelines-as-code-watcher-clusterbinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-f7lr7",
                        "uid": "c77cd7f3-3d6c-4359-bcc8-211680dde82c"
                    }
                ],
                "resourceVersion": "36075",
                "uid": "7a0edf27-b2eb-4164-a86d-21127ec16d48"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-as-code-watcher-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-watcher",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "f00f672efc2d4f98d63fcea41d469af1536dd5cc121075c654f29ff1a4723f78"
                },
                "creationTimestamp": "2026-04-24T21:33:32Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.43.0",
                    "operator.tekton.dev/operand-name": "openshift-pipeline-as-code"
                },
                "name": "pipelines-as-code-webhook-clusterbinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-f7lr7",
                        "uid": "c77cd7f3-3d6c-4359-bcc8-211680dde82c"
                    }
                ],
                "resourceVersion": "36083",
                "uid": "592aaba0-7e2c-4aed-a9bd-d898a8054be1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-as-code-webhook-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/component\":\"rbac\",\"app.kubernetes.io/created-by\":\"project-controller\",\"app.kubernetes.io/instance\":\"manager-rolebinding\",\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"clusterrolebinding\",\"app.kubernetes.io/part-of\":\"project-controller\"},\"name\":\"project-controller-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"project-controller-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"project-controller-controller-manager\",\"namespace\":\"project-controller\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:20Z",
                "labels": {
                    "app.kubernetes.io/component": "rbac",
                    "app.kubernetes.io/created-by": "project-controller",
                    "app.kubernetes.io/instance": "manager-rolebinding",
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "clusterrolebinding",
                    "app.kubernetes.io/part-of": "project-controller"
                },
                "name": "project-controller-manager-rolebinding",
                "resourceVersion": "20181",
                "uid": "838d60d9-133e-4af7-8234-b9bd905a3ca9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "project-controller-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "project-controller-controller-manager",
                    "namespace": "project-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-metrics-auth-rolebinding\"},\"labels\":{\"app.kubernetes.io/component\":\"metrics-service\",\"app.kubernetes.io/created-by\":\"project-controller\",\"app.kubernetes.io/instance\":\"metrics-auth-rolebinding\",\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"clusterrolebinding\",\"app.kubernetes.io/part-of\":\"project-controller\"},\"name\":\"project-controller-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"project-controller-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"project-controller-controller-manager\",\"namespace\":\"project-controller\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:20Z",
                "labels": {
                    "app.kubernetes.io/component": "metrics-service",
                    "app.kubernetes.io/created-by": "project-controller",
                    "app.kubernetes.io/instance": "metrics-auth-rolebinding",
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "clusterrolebinding",
                    "app.kubernetes.io/part-of": "project-controller"
                },
                "name": "project-controller-metrics-auth-rolebinding",
                "resourceVersion": "20184",
                "uid": "8580404f-f84f-45a0-a866-dc0821885ed3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "project-controller-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "project-controller-controller-manager",
                    "namespace": "project-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-prometheus-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-prometheus-role-binding\"},\"name\":\"project-controller-prometheus-role-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"project-controller-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"project-controller-metrics-reader\",\"namespace\":\"project-controller\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:20Z",
                "name": "project-controller-prometheus-role-binding",
                "resourceVersion": "20185",
                "uid": "38c263c3-4af4-4b89-886a-309011e4a268"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "project-controller-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "project-controller-metrics-reader",
                    "namespace": "project-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/prometheus-build-service-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/prometheus-build-service-metrics-reader\"},\"name\":\"prometheus-build-service-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"build-service-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "prometheus-build-service-metrics-reader",
                "resourceVersion": "19358",
                "uid": "b3d31c23-e4f8-4401-9b6a-b16b4271434c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "build-service-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "monitoring-cardinality-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-cardinality-exporter/prometheus-cardinality-exporter",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"monitoring-cardinality-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-cardinality-exporter/prometheus-cardinality-exporter\"},\"labels\":{\"kubernetes.io/part-of\":\"appstudio-cardinality-exporter\"},\"name\":\"prometheus-cardinality-exporter\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"prometheus-cardinality-exporter-list\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-cardinality-exporter\",\"namespace\":\"appstudio-cardinality-exporter\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:53Z",
                "labels": {
                    "kubernetes.io/part-of": "appstudio-cardinality-exporter"
                },
                "name": "prometheus-cardinality-exporter",
                "resourceVersion": "23201",
                "uid": "dd969f24-6b72-4284-ae12-a329d8d26bc7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-cardinality-exporter-list"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-cardinality-exporter",
                    "namespace": "appstudio-cardinality-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "monitoring-cardinality-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-cardinality-exporter/prometheus-cardinality-exporter-monitoring-view",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"monitoring-cardinality-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-cardinality-exporter/prometheus-cardinality-exporter-monitoring-view\"},\"labels\":{\"kubernetes.io/part-of\":\"appstudio-cardinality-exporter\"},\"name\":\"prometheus-cardinality-exporter-monitoring-view\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"cluster-monitoring-view\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-cardinality-exporter\",\"namespace\":\"appstudio-cardinality-exporter\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:53Z",
                "labels": {
                    "kubernetes.io/part-of": "appstudio-cardinality-exporter"
                },
                "name": "prometheus-cardinality-exporter-monitoring-view",
                "resourceVersion": "23202",
                "uid": "634068d5-e408-4b12-8dd0-d7b0fc20e52e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-cardinality-exporter",
                    "namespace": "appstudio-cardinality-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "dora-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:dora-metrics/prometheus-dora-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"dora-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:dora-metrics/prometheus-dora-metrics-reader\"},\"name\":\"prometheus-dora-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"dora-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-k8s\",\"namespace\":\"dora-metrics\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:12Z",
                "name": "prometheus-dora-metrics-reader",
                "resourceVersion": "19356",
                "uid": "06ca55b2-72ea-456a-bccd-c063583fa515"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dora-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "dora-metrics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/prometheus-image-controller-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/prometheus-image-controller-metrics-reader\"},\"name\":\"prometheus-image-controller-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"image-controller-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"image-controller\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:51Z",
                "name": "prometheus-image-controller-metrics-reader",
                "resourceVersion": "23098",
                "uid": "fa40fc54-b29a-40da-9c52-e8fd648ef6d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-controller-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:16:05Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-k8s",
                "resourceVersion": "11312",
                "uid": "8629e803-438a-4095-b7a0-7ef9e430f938"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/prometheus-kueue-external-admission-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/prometheus-kueue-external-admission-metrics-reader\"},\"name\":\"prometheus-kueue-external-admission-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"alert-mgr-kueue-admission-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"kueue-external-admission\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:32:21Z",
                "name": "prometheus-kueue-external-admission-metrics-reader",
                "resourceVersion": "34197",
                "uid": "28d62d58-0797-4a97-a0ce-7dd41e8b733b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-mgr-kueue-admission-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "kueue-external-admission"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/prometheus-multi-platform-controller-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/prometheus-multi-platform-controller-metrics-reader\"},\"name\":\"prometheus-multi-platform-controller-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"multi-platform-controller-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"multi-platform-controller\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:31:45Z",
                "name": "prometheus-multi-platform-controller-metrics-reader",
                "resourceVersion": "32360",
                "uid": "3ef7b17a-3284-4cc3-b48f-53fb362f09f0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multi-platform-controller-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "multi-platform-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "monitoring-workload-prometheus-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-workload-monitoring/prometheus-o11y-dummy-service-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"monitoring-workload-prometheus-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-workload-monitoring/prometheus-o11y-dummy-service-metrics-reader\"},\"name\":\"prometheus-o11y-dummy-service-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"o11y-dummy-service-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"dummy-service\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:23Z",
                "name": "prometheus-o11y-dummy-service-metrics-reader",
                "resourceVersion": "20523",
                "uid": "0d18de2a-ffa9-4b09-aad2-0aea90c232ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "o11y-dummy-service-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "dummy-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/prometheus-o11y-kubearchive-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/prometheus-o11y-kubearchive-metrics-reader\"},\"name\":\"prometheus-o11y-kubearchive-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"o11y-kubearchive-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"product-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:31:19Z",
                "name": "prometheus-o11y-kubearchive-metrics-reader",
                "resourceVersion": "30822",
                "uid": "9e6e942c-0e2a-4402-895c-7ff5755f1726"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "o11y-kubearchive-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:15:44Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "0.78.1"
                },
                "name": "prometheus-operator",
                "resourceVersion": "10587",
                "uid": "eaad8e8d-b956-43a5-8b2a-3b140c2878c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/prometheus-product-kubearchive-logging-metrics-reader",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/prometheus-product-kubearchive-logging-metrics-reader\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"name\":\"prometheus-product-kubearchive-logging-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"product-kubearchive-logging-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:08Z",
                "name": "prometheus-product-kubearchive-logging-metrics-reader",
                "resourceVersion": "24415",
                "uid": "011cff07-97c0-4a8f-ab8f-00704daf4dc9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "product-kubearchive-logging-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/prometheus-tekton-kueue-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/prometheus-tekton-kueue-metrics-reader\"},\"name\":\"prometheus-tekton-kueue-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-kueue-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"tekton-kueue\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:31:30Z",
                "name": "prometheus-tekton-kueue-metrics-reader",
                "resourceVersion": "32062",
                "uid": "40868abe-b2a1-4e18-bfe5-0a8dc206c5a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-kueue-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/prometheus-tekton-results-service-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/prometheus-tekton-results-service-metrics-reader\"},\"name\":\"prometheus-tekton-results-service-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-results-service-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"tekton-results\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "prometheus-tekton-results-service-metrics-reader",
                "resourceVersion": "27387",
                "uid": "f804e599-e3dc-4b8c-baf2-dcda337509cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-service-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:28:24Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "user-workload",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-user-workload",
                "resourceVersion": "20656",
                "uid": "4a6e57fa-9bbf-4a28-8fd5-88b52ee4f5fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-user-workload"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-user-workload",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:28:24Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "0.78.1"
                },
                "name": "prometheus-user-workload-operator",
                "resourceVersion": "20643",
                "uid": "e206016b-7ced-46cd-9628-06d2e48a6899"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-user-workload-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-operator",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/provider-kubernetes-edit",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/provider-kubernetes-edit\"},\"name\":\"provider-kubernetes-edit\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"edit\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"provider-kubernetes\",\"namespace\":\"crossplane-system\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:40Z",
                "name": "provider-kubernetes-edit",
                "resourceVersion": "22022",
                "uid": "650cb16b-e959-4375-b8ca-fb2264ba705a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "provider-kubernetes",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/provider-kubernetes-extra",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/provider-kubernetes-extra\"},\"name\":\"provider-kubernetes-extra\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"provider-kubernetes-extra\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"provider-kubernetes\",\"namespace\":\"crossplane-system\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:40Z",
                "name": "provider-kubernetes-extra",
                "resourceVersion": "22021",
                "uid": "7eca96b2-ee2d-4ac0-9b9f-90ad9b72049b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "provider-kubernetes-extra"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "provider-kubernetes",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "monitoring-registry-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-registry-exporter/registry-exporter-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"monitoring-registry-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-registry-exporter/registry-exporter-role-binding\"},\"name\":\"registry-exporter-role-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kube-rbac-proxy-registry\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"exporter-sa\",\"namespace\":\"appstudio-registry-exporter\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:50Z",
                "name": "registry-exporter-role-binding",
                "resourceVersion": "27190",
                "uid": "f2a25671-a281-47d9-9a51-a7cac180b5ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kube-rbac-proxy-registry"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "exporter-sa",
                    "namespace": "appstudio-registry-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "monitoring-registry-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-registry-exporter/registry-exporter-role-binding-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"monitoring-registry-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-registry-exporter/registry-exporter-role-binding-metrics-reader\"},\"name\":\"registry-exporter-role-binding-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"registry-exporter-role-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"appstudio-registry-exporter\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:50Z",
                "name": "registry-exporter-role-binding-metrics-reader",
                "resourceVersion": "27191",
                "uid": "5902523b-3814-45df-9e62-4f515417e50a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "registry-exporter-role-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "appstudio-registry-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:35Z",
                "name": "registry-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "732",
                "uid": "d4e8233a-bad6-44ae-8159-e78528e912ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "registry-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "imageregistry.operator.openshift.io/checksum": "sha256:74248883530fac21ef97d7c550c5f486050f236de11e2021e1f5961957eb75bc"
                },
                "creationTimestamp": "2026-04-24T21:05:56Z",
                "name": "registry-registry-role",
                "resourceVersion": "2491",
                "uid": "719565fa-a65b-4158-b673-4135245b2744"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:registry"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "registry",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-application-role-binding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-application-role-binding",
                "resourceVersion": "22791",
                "uid": "5f57f698-e025-4f36-b218-678752cabdf3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-application-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-component-role-binding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-component-role-binding",
                "resourceVersion": "22796",
                "uid": "b35d0a60-27a5-4935-ba2e-8ea4d81fec96"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-component-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-environment-role-binding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-environment-role-binding",
                "resourceVersion": "22811",
                "uid": "10519234-0345-445e-997e-7d7bdd3e23ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-environment-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-manager-rolebinding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-manager-rolebinding",
                "resourceVersion": "22808",
                "uid": "2fbd6be8-76cb-4f4e-9b47-554f1dace30f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-metrics-auth-rolebinding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-metrics-auth-rolebinding",
                "resourceVersion": "22793",
                "uid": "45bb7065-6a8d-4b08-8549-ebe922e7a1dd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-prometheus-role-binding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-prometheus-role-binding",
                "resourceVersion": "22810",
                "uid": "cc3d8172-bf35-40da-a196-dd91bfa88ad6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-prometheus-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-metrics-reader",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-release-role-binding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-release-role-binding",
                "resourceVersion": "22802",
                "uid": "f819ef79-44eb-401f-914f-58a513da97c8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-release-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-releaseplan-role-binding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-releaseplan-role-binding",
                "resourceVersion": "22804",
                "uid": "8076879d-31f4-4ea5-9299-e25271aa6446"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-releaseplan-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-releaseplanadmission-role-binding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-releaseplanadmission-role-binding",
                "resourceVersion": "22809",
                "uid": "faf3e700-33ec-4a4a-a803-c9078d592c04"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-releaseplanadmission-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-snapshot-role-binding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-snapshot-role-binding",
                "resourceVersion": "22792",
                "uid": "551ec846-2aa1-4cfb-adaa-3254a4598888"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-snapshot-editor-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-snapshotenvironmentbinding-role-binding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-snapshotenvironmentbinding-role-binding",
                "resourceVersion": "22803",
                "uid": "d3855c31-e4be-49d6-83f2-d06b5628237f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-snapshotenvironmentbinding-editor-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-tekton-role-binding"
                },
                "creationTimestamp": "2026-04-24T21:28:47Z",
                "name": "release-service-tekton-role-binding",
                "resourceVersion": "22807",
                "uid": "091b6c2c-4afa-40e4-a3a5-103bb2086797"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-tekton-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:06:03Z",
                "name": "router-monitoring",
                "resourceVersion": "3090",
                "uid": "f90d4380-e4fb-49f4-87a4-9e0a3f1bb5d1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "router-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:perf-team-prometheus-reader/sa-read-permissions-openshift-monitoring",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:perf-team-prometheus-reader/sa-read-permissions-openshift-monitoring\"},\"name\":\"sa-read-permissions-openshift-monitoring\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"cluster-monitoring-view\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"perf-team-prometheus-reader-cluster-sa\",\"namespace\":\"perf-team-prometheus-reader\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:26Z",
                "name": "sa-read-permissions-openshift-monitoring",
                "resourceVersion": "20816",
                "uid": "4f0466ce-35b2-4a39-8c81-b9d176f4f890"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "perf-team-prometheus-reader-cluster-sa",
                    "namespace": "perf-team-prometheus-reader"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "self-access-reviewers",
                "resourceVersion": "414",
                "uid": "8df02235-2ced-44e9-9316-2132302c3ecf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "self-access-reviewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "self-provisioners",
                "resourceVersion": "416",
                "uid": "8f99db29-31e2-4bb8-9fb0-f6b6087fb9fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "self-provisioner"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated:oauth"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:15:29Z",
                "name": "storage-version-migration-migrator",
                "resourceVersion": "10047",
                "uid": "33dbf384-1a37-42b3-a2ec-be4298ff83bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-storage-version-migrator-sa",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system-bootstrap-node-renewal",
                "resourceVersion": "1509",
                "uid": "dd9c4165-4ff4-4ac9-9702-af5926350c32"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:certificates.k8s.io:certificatesigningrequests:selfnodeclient"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:30Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:basic-user",
                "resourceVersion": "212",
                "uid": "103cfab1-1e57-4a24-aab8-1f51b1e4f2ed"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:basic-user"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:build-strategy-docker-binding",
                "resourceVersion": "423",
                "uid": "8bde5539-9175-4d5f-b13d-fa171997d7e8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:build-strategy-docker"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:build-strategy-jenkinspipeline-binding",
                "resourceVersion": "425",
                "uid": "16ee37ff-2675-4341-a0f0-15f07979fad0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:build-strategy-jenkinspipeline"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:build-strategy-source-binding",
                "resourceVersion": "424",
                "uid": "c8cc552f-9978-4fdf-815b-26cbdad324f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:build-strategy-source"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:attachdetach-controller",
                "resourceVersion": "223",
                "uid": "8f9cb3c5-65dd-42a1-9cc4-f0fd909fe89b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:attachdetach-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "attachdetach-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:certificate-controller",
                "resourceVersion": "249",
                "uid": "32affbf5-af66-4b52-956e-25daf3aa6b14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:certificate-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "certificate-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:clusterrole-aggregation-controller",
                "resourceVersion": "224",
                "uid": "0be1b830-794c-4f46-a692-8b559ebac9e1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:clusterrole-aggregation-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "clusterrole-aggregation-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cronjob-controller",
                "resourceVersion": "225",
                "uid": "18d0caf8-d819-49f5-8316-e282af596538"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:cronjob-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cronjob-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:daemon-set-controller",
                "resourceVersion": "226",
                "uid": "8f3c7185-f55d-4cbc-8dfd-f50562d196f2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:daemon-set-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "daemon-set-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:deployment-controller",
                "resourceVersion": "227",
                "uid": "d4bfc41c-f63f-40cd-8b38-1acdacc63fb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:deployment-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:disruption-controller",
                "resourceVersion": "228",
                "uid": "8fac841c-f933-4f7a-9f3d-565af74c0171"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:disruption-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "disruption-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpoint-controller",
                "resourceVersion": "229",
                "uid": "22249c0f-f00a-4383-9d41-e680e5c7206b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpoint-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpoint-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpointslice-controller",
                "resourceVersion": "230",
                "uid": "c4fdacd5-7b7b-4c17-a4c8-944e98818228"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpointslice-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpointslice-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpointslicemirroring-controller",
                "resourceVersion": "231",
                "uid": "803a375a-f08b-48e9-8bf6-0cb9784412d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpointslicemirroring-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpointslicemirroring-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ephemeral-volume-controller",
                "resourceVersion": "233",
                "uid": "77541cd3-afa1-47b9-b504-5650dd986080"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ephemeral-volume-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ephemeral-volume-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:expand-controller",
                "resourceVersion": "232",
                "uid": "62caa3c6-a0ed-415d-93b0-493eb61f831a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:expand-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "expand-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:generic-garbage-collector",
                "resourceVersion": "234",
                "uid": "eeb65131-a9c2-4298-aa0e-7814d5b77c07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:generic-garbage-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "generic-garbage-collector",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:horizontal-pod-autoscaler",
                "resourceVersion": "448",
                "uid": "10abc3b0-1302-48fc-9f8f-0f35de6f0eab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:horizontal-pod-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "horizontal-pod-autoscaler",
                    "namespace": "kube-system"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "horizontal-pod-autoscaler",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:job-controller",
                "resourceVersion": "236",
                "uid": "3ce06049-b135-4790-b50e-5bee9222ea5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:job-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "job-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:legacy-service-account-token-cleaner",
                "resourceVersion": "256",
                "uid": "32302a72-cd98-4f7d-87bd-a0747558c2b7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:legacy-service-account-token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "legacy-service-account-token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:namespace-controller",
                "resourceVersion": "237",
                "uid": "248f733e-46a1-4925-9096-20e19e48628d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:namespace-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:node-controller",
                "resourceVersion": "238",
                "uid": "6f2176e9-59cb-4b60-90f7-2271a7ea5377"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:node-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:persistent-volume-binder",
                "resourceVersion": "239",
                "uid": "0fdaa7e2-ff5d-4ea2-b142-663fde22a819"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:persistent-volume-binder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "persistent-volume-binder",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pod-garbage-collector",
                "resourceVersion": "240",
                "uid": "fe8eb7ee-4306-49d2-914b-26ed261bc8f9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pod-garbage-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pod-garbage-collector",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pv-protection-controller",
                "resourceVersion": "251",
                "uid": "7103ae52-022f-44f7-8b23-9cb704f808c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pv-protection-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pv-protection-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pvc-protection-controller",
                "resourceVersion": "250",
                "uid": "1b04182f-0d92-4c52-a67b-948f18ed5cd1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pvc-protection-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pvc-protection-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:replicaset-controller",
                "resourceVersion": "241",
                "uid": "935a2b95-1528-40d8-b333-8dbc84c2b250"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:replicaset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "replicaset-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:replication-controller",
                "resourceVersion": "242",
                "uid": "1dbba3b9-91c5-4503-9fe5-a7e57779dad2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:replication-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "replication-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:resourcequota-controller",
                "resourceVersion": "243",
                "uid": "1b8fbf38-03e0-4df2-afde-ff51429c0491"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:resourcequota-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "resourcequota-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:root-ca-cert-publisher",
                "resourceVersion": "253",
                "uid": "01f58bb6-d8fc-453a-b189-04f858739124"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:root-ca-cert-publisher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "root-ca-cert-publisher",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:route-controller",
                "resourceVersion": "244",
                "uid": "9419e3ac-502f-4bf1-8dca-5c3eca5df0b5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:route-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "route-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-account-controller",
                "resourceVersion": "245",
                "uid": "fb6ce414-12cd-4ff5-9aae-29f1b585a8e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-account-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-account-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-ca-cert-publisher",
                "resourceVersion": "254",
                "uid": "dc5ed02d-858d-4d75-92b4-00eae13bff30"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-ca-cert-publisher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca-cert-publisher",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-controller",
                "resourceVersion": "246",
                "uid": "aa27aa58-083f-447f-a677-bbf5c4afd53f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:statefulset-controller",
                "resourceVersion": "247",
                "uid": "5a7ef4c7-5121-4b1e-8803-e7102539f637"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:statefulset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "statefulset-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ttl-after-finished-controller",
                "resourceVersion": "252",
                "uid": "81d08312-b0a0-4869-a93f-6ba05c02bfe0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ttl-after-finished-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ttl-after-finished-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ttl-controller",
                "resourceVersion": "248",
                "uid": "76347f7d-40d9-43c8-856e-fe3f53d8dcdf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ttl-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ttl-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:validatingadmissionpolicy-status-controller",
                "resourceVersion": "255",
                "uid": "e38b017c-d439-4c10-bbb2-0bd4808c9fce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:validatingadmissionpolicy-status-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "validatingadmissionpolicy-status-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:deployer",
                "resourceVersion": "1610",
                "uid": "63b54b38-8b06-43d9-bbfc-70cb96188eb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:30Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:discovery",
                "resourceVersion": "211",
                "uid": "b9a3e161-7c6e-4461-a5de-a8bea730c749"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:image-builder",
                "resourceVersion": "451",
                "uid": "a2d553a1-4fe3-4b1e-8ee2-a96c42dd968d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:image-puller",
                "resourceVersion": "450",
                "uid": "94f6c5a6-66ca-44f6-b13a-83119f2eb77b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:30Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-controller-manager",
                "resourceVersion": "216",
                "uid": "435b8764-2388-432f-8b5a-831cc2b89381"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:30Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-dns",
                "resourceVersion": "217",
                "uid": "b063010f-c789-456e-9551-3e947d92b7d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-dns"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-dns",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-scheduler",
                "resourceVersion": "218",
                "uid": "fa449d66-8a7a-4e85-9efa-906912d28061"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:masters",
                "resourceVersion": "409",
                "uid": "0424a8bd-9c30-4704-a1f6-284c199c5e8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:master"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:masters"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:16:06Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "metrics-server",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "system:metrics-server",
                "resourceVersion": "11412",
                "uid": "2512df24-c49f-4c7a-8002-bcb1946ed4b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:metrics-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:30Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:monitoring",
                "resourceVersion": "210",
                "uid": "f210f383-2261-47a8-bf5e-f14f0f670ec8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node",
                "resourceVersion": "220",
                "uid": "2bd042e2-7ea0-4652-9f80-5b549f448c2c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node"
            }
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node-admin",
                "resourceVersion": "222",
                "uid": "6736a240-ee42-4b33-91a5-93d8940e7b03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:master"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-apiserver"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:node-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:node-admins",
                "resourceVersion": "410",
                "uid": "11f13853-4f76-4f68-b172-9d383fb14dbc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:master"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:node-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:node-bootstrapper",
                "resourceVersion": "426",
                "uid": "f55e637e-d18f-4959-9ad0-728436d0cd39"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-bootstrapper"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-bootstrapper",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:30Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node-proxier",
                "resourceVersion": "215",
                "uid": "8ed882ce-f298-4668-bfba-c60f76db25ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-proxier"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:node-proxiers",
                "resourceVersion": "419",
                "uid": "cf8d2de8-d910-4927-818d-69d5c9572386"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-proxier"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:oauth-token-deleters",
                "resourceVersion": "417",
                "uid": "e293a2c2-137d-40d6-a841-fee69724ca56"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:oauth-token-deleter"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:build-config-change-controller",
                "resourceVersion": "429",
                "uid": "1289c197-8721-424e-950c-437e383063ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:build-config-change-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-config-change-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:build-controller",
                "resourceVersion": "428",
                "uid": "bc00a235-7a64-4125-acca-17e187a6ce47"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:build-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:cluster-csr-approver-controller",
                "resourceVersion": "1502",
                "uid": "af90d4b0-52df-43fa-afa9-2629f2572374"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:cluster-csr-approver-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-csr-approver-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:cluster-quota-reconciliation-controller",
                "resourceVersion": "442",
                "uid": "a99dff63-786d-4d59-aa14-356d3475a33f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:cluster-quota-reconciliation-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-quota-reconciliation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:default-rolebindings-controller",
                "resourceVersion": "452",
                "uid": "0136d8ac-84d1-492a-bd7a-b46336ac1c95"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:default-rolebindings-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:deployer-controller",
                "resourceVersion": "430",
                "uid": "4df93987-6512-4396-b6a6-97b982ad684c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:deployer-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:deploymentconfig-controller",
                "resourceVersion": "431",
                "uid": "b2962dae-666f-4450-834b-f3e2865f04ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:deploymentconfig-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deploymentconfig-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:horizontal-pod-autoscaler",
                "resourceVersion": "447",
                "uid": "19eb962f-2809-45d4-ac28-ef89a9f8911b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:horizontal-pod-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "horizontal-pod-autoscaler",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:image-import-controller",
                "resourceVersion": "441",
                "uid": "3e06e32b-b12b-4f9a-84bc-e65191ccb695"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:image-import-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-import-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:image-trigger-controller",
                "resourceVersion": "440",
                "uid": "acd0d75f-18f3-41b5-81e9-5cc96f1a0904"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:image-trigger-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-trigger-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:44Z",
                "name": "system:openshift:controller:machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1076",
                "uid": "0262aff3-13e9-415f-a2de-7107bf8588a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:namespace-security-allocation-controller",
                "resourceVersion": "1506",
                "uid": "4c1d8568-52aa-4769-a74d-ccffaf83f27a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:namespace-security-allocation-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-security-allocation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:origin-namespace-controller",
                "resourceVersion": "437",
                "uid": "fa1c9068-28d6-4316-b28e-92c7a06400a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:origin-namespace-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "origin-namespace-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:podsecurity-admission-label-syncer-controller",
                "resourceVersion": "1586",
                "uid": "927e3477-2761-4a76-bc52-6f82b2483144"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:podsecurity-admission-label-syncer-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "podsecurity-admission-label-syncer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:privileged-namespaces-psa-label-syncer",
                "resourceVersion": "1596",
                "uid": "a4ae96dd-8576-435c-8aa9-7d8f494a40d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:privileged-namespaces-psa-label-syncer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "privileged-namespaces-psa-label-syncer",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:pv-recycler-controller",
                "resourceVersion": "445",
                "uid": "8f348acb-e810-46e0-bb34-b2fabd326393"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:pv-recycler-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pv-recycler-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:resourcequota-controller",
                "resourceVersion": "446",
                "uid": "131197da-dea0-4b0b-861d-26bbc1397a03"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:resourcequota-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "resourcequota-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:15:28Z",
                "name": "system:openshift:controller:service-ca",
                "resourceVersion": "9984",
                "uid": "e2857dd2-4cfe-4dd6-a347-cd62ba38a536"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:service-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:service-ingress-ip-controller",
                "resourceVersion": "444",
                "uid": "7a0cbd36-cd37-4277-9b65-de0a1394d917"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:service-ingress-ip-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ingress-ip-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:serviceaccount-controller",
                "resourceVersion": "438",
                "uid": "b7645863-ca42-483f-915c-bd0c9fe17a52"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:serviceaccount-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "serviceaccount-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:serviceaccount-pull-secrets-controller",
                "resourceVersion": "439",
                "uid": "9c0da4d2-b585-4868-bf34-edaac67f92d4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:serviceaccount-pull-secrets-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "serviceaccount-pull-secrets-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:template-instance-controller",
                "resourceVersion": "432",
                "uid": "e3a7505f-3fae-425e-abde-8ea9761e17b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:template-instance-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:template-instance-controller:admin",
                "resourceVersion": "433",
                "uid": "e1f90a2d-da25-466c-a986-a4438b46b248"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:template-instance-finalizer-controller",
                "resourceVersion": "434",
                "uid": "0382b7a9-108a-401e-afde-517df78c90d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:template-instance-finalizer-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-finalizer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:template-instance-finalizer-controller:admin",
                "resourceVersion": "435",
                "uid": "685bfb75-b607-49cc-abb3-714f45c64db3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-finalizer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:template-service-broker",
                "resourceVersion": "449",
                "uid": "a08b7239-be0d-4cfb-a131-bcacb9216159"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:template-service-broker"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-service-broker",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:controller:unidling-controller",
                "resourceVersion": "443",
                "uid": "6c6d54f0-9434-44fb-8ef2-290820698d9e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:unidling-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "unidling-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:openshift:discovery",
                "resourceVersion": "422",
                "uid": "2fbc5216-de16-4c36-b3be-18a412b9c28b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:openshift-controller-manager:image-trigger-controller",
                "resourceVersion": "1571",
                "uid": "1fcdce6f-cd1f-4a71-a623-dc70b9708a7d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:openshift-controller-manager:image-trigger-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-trigger-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:openshift-controller-manager:ingress-to-route-controller",
                "resourceVersion": "1505",
                "uid": "3c28abdb-7425-4fc0-a85a-b150f5b03f3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:openshift-controller-manager:ingress-to-route-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-to-route-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:42Z",
                "name": "system:openshift:operator:authentication",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1016",
                "uid": "97d2b616-b34f-4287-b3ac-8940e4854c8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "authentication-operator",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:40Z",
                "name": "system:openshift:operator:cluster-kube-scheduler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "922",
                "uid": "f95e5dd0-bfd2-44d1-9827-bbc10ae9b730"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-kube-scheduler-operator",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:56Z",
                "name": "system:openshift:operator:kube-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "2377",
                "uid": "c2a4e4b5-60e9-4d5f-9c36-8fbf8b670846"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-apiserver-operator",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:41Z",
                "name": "system:openshift:operator:kube-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "960",
                "uid": "da6ac511-08a5-4429-895c-804fbbf47697"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-controller-manager-operator",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:43Z",
                "name": "system:openshift:operator:kube-storage-version-migrator-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1042",
                "uid": "7d7817b8-811d-4d68-bb58-331829d15ccf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-storage-version-migrator-operator",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:41Z",
                "name": "system:openshift:operator:openshift-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "961",
                "uid": "a16984e1-2bc2-4516-b315-13bf760d4590"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-apiserver-operator",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:56Z",
                "name": "system:openshift:operator:openshift-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "2479",
                "uid": "d08da2e2-9338-42fe-b1c7-a6bcae2b0637"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-config-operator",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:41Z",
                "name": "system:openshift:operator:openshift-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "959",
                "uid": "27ec45cd-0e6a-48ed-9919-3010a7a56209"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-controller-manager-operator",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:35Z",
                "name": "system:openshift:operator:service-ca-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "709",
                "uid": "aafbd3d2-a3bc-4d4f-b037-16c0c107ab84"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca-operator",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:30Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:openshift:public-info-viewer",
                "resourceVersion": "214",
                "uid": "1bac13a6-54e9-485e-b228-ce0506328918"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:public-info-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:unauthenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:47Z",
                "name": "system:openshift:scc:restricted-v2",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "509cbbe8-c297-43cb-b53d-7eb0cae84621"
                    }
                ],
                "resourceVersion": "1180",
                "uid": "473a7f57-e62d-4239-9104-903e31e04c7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:scc:restricted-v2"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:05:53Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:useroauthaccesstoken-manager",
                "resourceVersion": "1618",
                "uid": "8333078e-8a41-440e-8d1b-2a7d1bd58bac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:useroauthaccesstoken-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated:oauth"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:30Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:public-info-viewer",
                "resourceVersion": "213",
                "uid": "e1ca57e3-4256-455c-963d-eb9acd71cd65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:public-info-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:unauthenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:scope-impersonation",
                "resourceVersion": "427",
                "uid": "d3a9c806-e6e7-4887-868f-fa9f02c091f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:scope-impersonation"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:sdn-readers",
                "resourceVersion": "420",
                "uid": "73c51551-13d7-4597-adb9-c6cb9619c704"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:sdn-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:service-account-issuer-discovery",
                "resourceVersion": "221",
                "uid": "22b4e823-1d75-4e94-ac25-2b80e6f0f866"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:service-account-issuer-discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:31Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:volume-scheduler",
                "resourceVersion": "219",
                "uid": "f1f9f69a-5048-4bff-a563-13942c95e480"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:volume-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-04-24T21:04:39Z",
                "name": "system:webhooks",
                "resourceVersion": "421",
                "uid": "745e3572-023a-4c29-a4c9-1015d47693de"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:webhook"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "145e037cb1644dd1574ec2f137ad60d0a5f68affd594807f68015b2cdc4c9377"
                },
                "creationTimestamp": "2026-04-24T21:32:28Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains",
                    "operator.tekton.dev/operand-name": "tektoncd-chains"
                },
                "name": "tekton-chains-controller-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-zkctk",
                        "uid": "43976a46-a70c-4a59-9160-4cbf6a5a22ff"
                    }
                ],
                "resourceVersion": "34714",
                "uid": "94b6dbbe-8603-420a-82d9-392335372e16"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "0f612b1f86099474443136448f10694e0c7fc7ae7b8e19a43cecc05fe4b4ab6b"
                },
                "creationTimestamp": "2026-04-24T21:32:28Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains",
                    "operator.tekton.dev/operand-name": "tektoncd-chains"
                },
                "name": "tekton-chains-controller-tenant-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-zkctk",
                        "uid": "43976a46-a70c-4a59-9160-4cbf6a5a22ff"
                    }
                ],
                "resourceVersion": "34715",
                "uid": "5228a05c-32f2-48ac-a019-c74a00956d6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-controller-tenant-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "117476c24163f733f2aac83e9f25dac905e42ab582522fc912fca003092e774d"
                },
                "creationTimestamp": "2026-04-24T21:31:28Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-clustertasks-view-rolebinding-all-users",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-hf44r",
                        "uid": "6d20ef87-cd98-4ff8-96aa-924dc04dcaf3"
                    }
                ],
                "resourceVersion": "31300",
                "uid": "90100072-4ca9-40f4-9249-00560ccc559c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-clustertasks-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "509fdefd176f02585844d115f4da569fbc5507d61fd2ea587369b68a74e3257a"
                },
                "creationTimestamp": "2026-04-24T21:32:14Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-clustertriggerbindings-view-rolebinding-all-users",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-6bvlh",
                        "uid": "28e4a18d-deb7-439f-8a29-22711d0670b8"
                    }
                ],
                "resourceVersion": "33664",
                "uid": "72fb658e-eae3-495c-8d43-a82795ecd19d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-clustertriggerbindings-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:30:37Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v5.0.5-806"
                },
                "name": "tekton-config-read-rolebinding",
                "resourceVersion": "29499",
                "uid": "534ee5d1-d7f0-45be-9af5-6b9c342d2de2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-config-read-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "5905fdfbbed6c12afd0aa52fd0c4aa7fdf47358950f6785c433394f8efb78163"
                },
                "creationTimestamp": "2026-04-24T21:31:26Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-events-controller-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-hf44r",
                        "uid": "6d20ef87-cd98-4ff8-96aa-924dc04dcaf3"
                    }
                ],
                "resourceVersion": "31197",
                "uid": "5cf36ff6-e4f2-4e3f-943e-520bf852ae50"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-events-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"tekton-kueue\"},\"name\":\"tekton-kueue-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-kueue-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-kueue-controller-manager\",\"namespace\":\"tekton-kueue\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:32:21Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "tekton-kueue"
                },
                "name": "tekton-kueue-manager-rolebinding",
                "resourceVersion": "34195",
                "uid": "828fdc2c-f9b4-4b3b-aaaa-4020ee9726e5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-kueue-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-kueue-controller-manager",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-metrics-auth-rolebinding\"},\"name\":\"tekton-kueue-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-kueue-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-kueue-controller-manager\",\"namespace\":\"tekton-kueue\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:32:21Z",
                "name": "tekton-kueue-metrics-auth-rolebinding",
                "resourceVersion": "34198",
                "uid": "d2d8504d-bbb9-4d51-ace6-1f4df4d171d0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-kueue-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-kueue-controller-manager",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-metrics-auth-webhook-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-metrics-auth-webhook-rolebinding\"},\"name\":\"tekton-kueue-metrics-auth-webhook-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-kueue-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-kueue-webhook\",\"namespace\":\"tekton-kueue\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:32:21Z",
                "name": "tekton-kueue-metrics-auth-webhook-rolebinding",
                "resourceVersion": "34196",
                "uid": "d3041496-db98-40f5-922e-b1b23f14372a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-kueue-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-kueue-webhook",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:30:36Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v5.0.5-806"
                },
                "name": "tekton-multicluster-proxy-aae-rolebinding",
                "resourceVersion": "29470",
                "uid": "716841fc-0819-4154-afb2-71c10b6d793d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-multicluster-proxy-aae-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operator",
                    "namespace": "tekton-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "482178e862f4f03face4af1b053c333fbb83c76807d869ff22259c72e4a57f85"
                },
                "creationTimestamp": "2026-04-24T21:31:29Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-operators-proxy-webhook-admin",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-hf44r",
                        "uid": "6d20ef87-cd98-4ff8-96aa-924dc04dcaf3"
                    }
                ],
                "resourceVersion": "31310",
                "uid": "54d53863-0abe-440c-9f03-c04040dc964c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-operators-proxy-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operators-proxy-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "eb34932e9185127d96cbab7c789d1ab84bc86d6d8c1813b7485fd943873f41c4"
                },
                "creationTimestamp": "2026-04-24T21:31:26Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-controller-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-hf44r",
                        "uid": "6d20ef87-cd98-4ff8-96aa-924dc04dcaf3"
                    }
                ],
                "resourceVersion": "31186",
                "uid": "87d5ddb3-b07d-4910-a644-711531cf4b77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "a7c4510e1f9995ae6a58ecc25cab7cd6b37662fdfd8f7cf683d1e0d4b9397e6b"
                },
                "creationTimestamp": "2026-04-24T21:31:26Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-controller-tenant-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-hf44r",
                        "uid": "6d20ef87-cd98-4ff8-96aa-924dc04dcaf3"
                    }
                ],
                "resourceVersion": "31191",
                "uid": "9c840364-9097-413a-bb9c-fe5d6cb219ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-controller-tenant-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "41c344b3ac47d37375aee0dbdd28d5bf7df4cc16fa575ff075e1f6980ac807c5"
                },
                "creationTimestamp": "2026-04-24T21:31:27Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-resolvers",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-hf44r",
                        "uid": "6d20ef87-cd98-4ff8-96aa-924dc04dcaf3"
                    }
                ],
                "resourceVersion": "31266",
                "uid": "ee10be9f-8856-464a-a8e9-706c40ddf924"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-resolvers-resolution-request-updates"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "28cba881f5924a1014dadb5373107e2ae4438beab91a7bb4e719b4a7a16fb891"
                },
                "creationTimestamp": "2026-04-24T21:31:26Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-webhook-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-hf44r",
                        "uid": "6d20ef87-cd98-4ff8-96aa-924dc04dcaf3"
                    }
                ],
                "resourceVersion": "31196",
                "uid": "5bbaaae1-8d27-48fd-9d45-89b65974b14d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-webhook-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:30:38Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v5.0.5-806"
                },
                "name": "tekton-result-read-rolebinding",
                "resourceVersion": "29597",
                "uid": "efd14b09-1f19-42d5-bccc-f337d293f329"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-result-read-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-api",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-api\"},\"labels\":{\"app.kubernetes.io/part-of\":\"tekton-results\",\"app.kubernetes.io/version\":\"devel\"},\"name\":\"tekton-results-api\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-results-api\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-results-api\",\"namespace\":\"tekton-results\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "labels": {
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "devel"
                },
                "name": "tekton-results-api",
                "resourceVersion": "27386",
                "uid": "36efa2a5-d2c6-4869-8d00-13da86caecee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-api"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-results-api",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher\"},\"labels\":{\"app.kubernetes.io/part-of\":\"tekton-results\",\"app.kubernetes.io/version\":\"devel\"},\"name\":\"tekton-results-watcher\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-results-watcher\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-results-watcher\",\"namespace\":\"tekton-results\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "labels": {
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "devel"
                },
                "name": "tekton-results-watcher",
                "resourceVersion": "27388",
                "uid": "33daecfa-9357-4c98-8fda-733da527afaf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-watcher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-results-watcher",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher-logs",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher-logs\"},\"name\":\"tekton-results-watcher-logs\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-results-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-results-watcher\",\"namespace\":\"tekton-results\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "tekton-results-watcher-logs",
                "resourceVersion": "27394",
                "uid": "f47f244c-8fe3-4d94-a252-ad34d999f029"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-results-watcher",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher-rbac",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher-rbac\"},\"name\":\"tekton-results-watcher-rbac\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-results-watcher-rbac\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-results-watcher\",\"namespace\":\"tekton-results\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:53Z",
                "name": "tekton-results-watcher-rbac",
                "resourceVersion": "27397",
                "uid": "32f8b363-1bfc-4552-9439-e11a687b4080"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-watcher-rbac"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-results-watcher",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:30:37Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v5.0.5-806"
                },
                "name": "tekton-scheduler-rolebinding",
                "resourceVersion": "29502",
                "uid": "724ac5c0-96aa-48d6-abac-8cecd4c2fb57"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-scheduler-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "fff4bbecb3726c45db8848c8fcf077be050a1545beed7ba1d0d951b3cf02d1ae"
                },
                "creationTimestamp": "2026-04-24T21:32:13Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-controller-admin",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-6bvlh",
                        "uid": "28e4a18d-deb7-439f-8a29-22711d0670b8"
                    }
                ],
                "resourceVersion": "33584",
                "uid": "97e50a12-52ad-4517-bac0-88d3595af60b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "04a22ab77268f8714e681834483ca3e6d02983e2351c864dc5aaa7d1523ca0fa"
                },
                "creationTimestamp": "2026-04-24T21:32:13Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-core-interceptors",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-6bvlh",
                        "uid": "28e4a18d-deb7-439f-8a29-22711d0670b8"
                    }
                ],
                "resourceVersion": "33605",
                "uid": "d7603520-92a4-40f8-baa7-7ae66bd36893"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-core-interceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "a6d1e2afc4d282230577b108795772a656695b30e3af2de8535ff083e3028968"
                },
                "creationTimestamp": "2026-04-24T21:32:13Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-core-interceptors-secrets",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-6bvlh",
                        "uid": "28e4a18d-deb7-439f-8a29-22711d0670b8"
                    }
                ],
                "resourceVersion": "33607",
                "uid": "890f40be-e953-4838-85bb-08d584f843b2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-core-interceptors-secrets"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "0fd5f4031bf4277557b9ef8d0607c8e9a44b2cc675fd0542ec1dc78c710d82ca"
                },
                "creationTimestamp": "2026-04-24T21:32:13Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-webhook-admin",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-6bvlh",
                        "uid": "28e4a18d-deb7-439f-8a29-22711d0670b8"
                    }
                ],
                "resourceVersion": "33598",
                "uid": "a10e7a46-693d-420b-ba45-c9146cfbbc14"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:16:05Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "telemeter-client",
                "resourceVersion": "11309",
                "uid": "945d623e-5545-45e7-b29c-03fab79baac4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "telemeter-client"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "telemeter-client",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:17:25Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "telemeter-client-view",
                "resourceVersion": "13579",
                "uid": "608c1833-d1dc-4e36-922e-3a068846d51f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "telemeter-client",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:28:55Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "tempo-operator.v0.20.0-3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tempo-operator",
                    "operators.coreos.com/tempo-product.tempo-operator": ""
                },
                "name": "tempo-operator-controller-service-system:auth-delegator",
                "resourceVersion": "23516",
                "uid": "c75f21d2-a512-4e5c-b28f-7b33e2a9a113"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:28:51Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "operator-lifecycle-manager",
                    "app.kubernetes.io/name": "tempo-operator",
                    "app.kubernetes.io/part-of": "tempo-operator",
                    "olm.managed": "true",
                    "olm.owner": "tempo-operator.v0.20.0-3"
                },
                "name": "tempo-operator-manager-rolebinding-cluster-monitoring-view",
                "resourceVersion": "23682",
                "uid": "5554b414-703a-4e78-a691-8c0021b80138"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:28:55Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "tempo-operator.v0.20.0-3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tempo-operator",
                    "olm.permissions.hash": "aRJgoPee7Jp0Wrp5NO0SdVNCmNfPOInjqtOg79",
                    "operators.coreos.com/tempo-product.tempo-operator": ""
                },
                "name": "tempo-operator.v0.20.0-3-90meOMbVKfW64WsEv1Vf3b5w7LY2M7UmCnq9HZ",
                "resourceVersion": "23421",
                "uid": "49594204-6870-41a0-95c4-319b294d5fff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tempo-operator.v0.20.0-3-90meOMbVKfW64WsEv1Vf3b5w7LY2M7UmCnq9HZ"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:28:55Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "tempo-operator.v0.20.0-3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tempo-operator",
                    "olm.permissions.hash": "63DQMnougpWkpxpLsyHsgGOxChX9Oh9duRI6UW",
                    "operators.coreos.com/tempo-product.tempo-operator": ""
                },
                "name": "tempo-operator.v0.20.0-3-VHnQmLuTkmE4kuXPmUHVGQdFkBTxSOufvK2Rr",
                "resourceVersion": "24038",
                "uid": "f5d14bfc-06a8-44dd-b26b-55646c5c7fbf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tempo-operator.v0.20.0-3-VHnQmLuTkmE4kuXPmUHVGQdFkBTxSOufvK2Rr"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:16:07Z",
                "labels": {
                    "app.kubernetes.io/component": "query-layer",
                    "app.kubernetes.io/instance": "thanos-querier",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "thanos-query",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "0.36.1"
                },
                "name": "thanos-querier",
                "resourceVersion": "11517",
                "uid": "dabc8891-7c27-4e8c-ac0c-3b9de30bf6b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "thanos-querier"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "thanos-querier",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:28:26Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "thanos-ruler",
                "resourceVersion": "20778",
                "uid": "41830abb-4bee-4ff9-8cfd-fc6801807327"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "thanos-ruler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "thanos-ruler",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-04-24T21:28:26Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "thanos-ruler-monitoring",
                "resourceVersion": "20780",
                "uid": "959fbaea-16fe-4e66-9d99-16103eb06f02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "thanos-ruler",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "disaster-recovery-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-disaster-recovery/triggers-cron-eventlistener-binding-cr"
                },
                "creationTimestamp": "2026-04-24T21:34:10Z",
                "name": "triggers-cron-eventlistener-binding-cr",
                "resourceVersion": "37078",
                "uid": "840b6b00-2ed4-465e-90ec-88b8cb293d63"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-eventlistener-clusterroles"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cron-trigger",
                    "namespace": "konflux-disaster-recovery"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "trust-manager-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/trust-manager",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"trust-manager-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/trust-manager\"},\"labels\":{\"app.kubernetes.io/instance\":\"trust-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"trust-manager\",\"app.kubernetes.io/version\":\"v0.19.0\",\"helm.sh/chart\":\"trust-manager-v0.19.0\"},\"name\":\"trust-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"trust-manager\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:30Z",
                "labels": {
                    "app.kubernetes.io/instance": "trust-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "trust-manager",
                    "app.kubernetes.io/version": "v0.19.0",
                    "helm.sh/chart": "trust-manager-v0.19.0"
                },
                "name": "trust-manager",
                "resourceVersion": "26651",
                "uid": "857548af-8b2f-4eb8-ab25-561ec73fd222"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "trust-manager"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trust-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"labels\":{\"app.kubernetes.io/component\":\"Agent\",\"app.kubernetes.io/instance\":\"vector\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"vector\",\"app.kubernetes.io/version\":\"0.52.0-distroless-libc\",\"helm.sh/chart\":\"vector-0.49.0\"},\"name\":\"vector\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"vector\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"vector\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:32:05Z",
                "labels": {
                    "app.kubernetes.io/component": "Agent",
                    "app.kubernetes.io/instance": "vector",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "vector",
                    "app.kubernetes.io/version": "0.52.0-distroless-libc",
                    "helm.sh/chart": "vector-0.49.0"
                },
                "name": "vector",
                "resourceVersion": "32981",
                "uid": "da82f589-7c6c-4973-877c-3a5ff186bf81"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "vector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "vector",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector-scc-binding",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector-scc-binding\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"name\":\"vector-scc-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kubearchive-vector-scc-user\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"vector\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"loki\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"loki-sa\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"grafana\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"loki\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"loki-canary\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:08Z",
                "name": "vector-scc-binding",
                "resourceVersion": "24462",
                "uid": "dbc405e9-2db4-43ff-9c66-94d09c450f4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-vector-scc-user"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "vector",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "loki",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "loki-sa",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "grafana",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "loki",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "loki-canary",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector-scc-binding-dev-extras",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector-scc-binding-dev-extras\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"name\":\"vector-scc-binding-dev-extras\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kubearchive-vector-scc-user\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"minio-sa\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"minio\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:29:08Z",
                "name": "vector-scc-binding-dev-extras",
                "resourceVersion": "24493",
                "uid": "a272365e-b51f-43c1-b1fe-2742afcde3a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-vector-scc-user"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "minio-sa",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "minio",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "vector-tekton-logs-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:tekton-logging/vector-tekton-logs-collector",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector Runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector Runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector Runs requires certain host mounts to watch files being created by pods.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"vector-tekton-logs-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:tekton-logging/vector-tekton-logs-collector\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector Runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector Runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector Runs requires certain host mounts to watch files being created by pods.\\\"\\n\"},\"labels\":{\"app.kubernetes.io/component\":\"Agent\",\"app.kubernetes.io/instance\":\"vector-tekton-logs-collector\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"vector\",\"app.kubernetes.io/version\":\"0.45.0-distroless-libc\",\"helm.sh/chart\":\"vector-0.41.0\"},\"name\":\"vector-tekton-logs-collector\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"vector-tekton-logs-collector\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"vector-tekton-logs-collector\",\"namespace\":\"tekton-logging\"}]}\n"
                },
                "creationTimestamp": "2026-04-24T21:28:23Z",
                "labels": {
                    "app.kubernetes.io/component": "Agent",
                    "app.kubernetes.io/instance": "vector-tekton-logs-collector",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "vector",
                    "app.kubernetes.io/version": "0.45.0-distroless-libc",
                    "helm.sh/chart": "vector-0.41.0"
                },
                "name": "vector-tekton-logs-collector",
                "resourceVersion": "20543",
                "uid": "931c09cd-9df2-44cf-a1c1-61a978c91ce1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "vector-tekton-logs-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "vector-tekton-logs-collector",
                    "namespace": "tekton-logging"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
