{
    "apiVersion": "v1",
    "items": [
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/alert-mgr-kueue-admission-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/alert-mgr-kueue-admission-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"alert-manager-kueue-admission\"},\"name\":\"alert-mgr-kueue-admission-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"alert-mgr-kueue-admission-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"alert-mgr-kueue-admission-controller-manager\",\"namespace\":\"kueue-external-admission\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:45:43Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "alert-manager-kueue-admission"
                },
                "name": "alert-mgr-kueue-admission-manager-rolebinding",
                "resourceVersion": "36898",
                "uid": "3b463c0a-d363-47c3-8cc6-9d1f5cba9437"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-mgr-kueue-admission-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "alert-mgr-kueue-admission-controller-manager",
                    "namespace": "kueue-external-admission"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/alert-mgr-kueue-admission-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/alert-mgr-kueue-admission-metrics-auth-rolebinding\"},\"name\":\"alert-mgr-kueue-admission-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"alert-mgr-kueue-admission-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"alert-mgr-kueue-admission-controller-manager\",\"namespace\":\"kueue-external-admission\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:45:43Z",
                "name": "alert-mgr-kueue-admission-metrics-auth-rolebinding",
                "resourceVersion": "36894",
                "uid": "c4de2995-7be7-4930-b823-964e5014fe34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-mgr-kueue-admission-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "alert-mgr-kueue-admission-controller-manager",
                    "namespace": "kueue-external-admission"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:28Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "alertmanager-main",
                "resourceVersion": "11663",
                "uid": "4b4d2a3b-99d7-4bcc-afd0-c6d2b79934c0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alertmanager-main"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "alertmanager-main",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding\"},\"name\":\"application-service-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"application-service-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"application-service-controller-manager\",\"namespace\":\"application-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:13Z",
                "name": "application-service-manager-rolebinding",
                "resourceVersion": "22298",
                "uid": "7973fe50-6eda-4683-bb5c-b3fea6ce4766"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "application-service-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "application-service-controller-manager",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding-build",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding-build\"},\"name\":\"application-service-manager-rolebinding-build\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"application-service-manager-role-build\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"application-service-controller-manager\",\"namespace\":\"application-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:13Z",
                "name": "application-service-manager-rolebinding-build",
                "resourceVersion": "22304",
                "uid": "28bb8f18-26c1-4ff7-a7c0-d81a9f00c3df"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "application-service-manager-role-build"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "application-service-controller-manager",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding-spi",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-manager-rolebinding-spi\"},\"name\":\"application-service-manager-rolebinding-spi\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"application-service-manager-role-spi\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"application-service-controller-manager\",\"namespace\":\"application-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:13Z",
                "name": "application-service-manager-rolebinding-spi",
                "resourceVersion": "22290",
                "uid": "83cbc31a-8e30-4521-b727-c9b8df554f2e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "application-service-manager-role-spi"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "application-service-controller-manager",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-proxy-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/application-service-proxy-rolebinding\"},\"name\":\"application-service-proxy-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"application-service-proxy-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"application-service-controller-manager\",\"namespace\":\"application-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:13Z",
                "name": "application-service-proxy-rolebinding",
                "resourceVersion": "22296",
                "uid": "6cfbc568-93a0-42c6-8077-22a83cd4c49c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "application-service-proxy-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "application-service-controller-manager",
                    "namespace": "application-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"appstudio-openshift-gitops-argocd-application-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"appstudio-openshift-gitops-argocd-application-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:38:52Z",
                "name": "appstudio-openshift-gitops-argocd-application-controller",
                "resourceVersion": "17804",
                "uid": "bfe77b60-2aab-4c65-b36f-d79de7c5107c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"appstudio-openshift-gitops-argocd-server\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"appstudio-openshift-gitops-argocd-server\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-server\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:38:52Z",
                "name": "appstudio-openshift-gitops-argocd-server",
                "resourceVersion": "17805",
                "uid": "fbbea295-76ba-45cb-82f4-121dfe4706ba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:48Z",
                "name": "aws-ebs-csi-driver-operator-clusterrolebinding",
                "resourceVersion": "1403",
                "uid": "631d6483-0896-4f91-b865-9efb6ac032fc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "aws-ebs-csi-driver-operator-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-operator",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:51Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "aws-pod-identity-webhook",
                "resourceVersion": "1807",
                "uid": "9c409263-dd9a-4baa-841a-038b1f3fbfbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "aws-pod-identity-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-pod-identity-webhook",
                    "namespace": "openshift-authentication"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:50Z",
                "name": "backplane-ai-agent-c0",
                "resourceVersion": "5636",
                "uid": "faf92357-1ee1-42e3-85fe-682c69aa96a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-ai-agent"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:24Z",
                "name": "backplane-cee-c0",
                "resourceVersion": "4965",
                "uid": "5203e932-af56-4b68-b7d9-ad24a43d072a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-cee-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:24Z",
                "name": "backplane-cee-c1",
                "resourceVersion": "4968",
                "uid": "60324aa2-6390-436d-bab1-f891710a23b3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cee"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:03Z",
                "name": "backplane-cluster-admin",
                "resourceVersion": "5973",
                "uid": "f05b57cb-04b7-4fe6-9229-4d44b3a7c2c5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "backplane-cluster-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:15Z",
                "name": "backplane-cse-c0",
                "resourceVersion": "6305",
                "uid": "32f9c60e-9612-4ef8-9610-d97452b6a118"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-cse"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:04Z",
                "name": "backplane-csm-c0",
                "resourceVersion": "6036",
                "uid": "1645f5c8-fe02-48b5-9bf8-d3284af9027d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-csm-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:04Z",
                "name": "backplane-csm-c1",
                "resourceVersion": "6040",
                "uid": "1927d1d5-a620-4a00-8af5-b34591f58ed7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-csm"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:03Z",
                "name": "backplane-impersonate-cluster-admin",
                "resourceVersion": "5967",
                "uid": "96bd4691-1906-4fa7-8358-3280cb81c679"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-impersonate-cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:25Z",
                "name": "backplane-lpsre-c0",
                "resourceVersion": "6508",
                "uid": "375722ea-3732-4615-9313-f13791f17762"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:25Z",
                "name": "backplane-lpsre-c1",
                "resourceVersion": "6511",
                "uid": "5b1cbe06-9fc8-4de6-acee-fe036d903d02"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:22Z",
                "name": "backplane-lpsre-package-operator-c0",
                "resourceVersion": "6450",
                "uid": "f58e2d7a-93e6-4f61-97b1-6587780593eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-lpsre-package-operator-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-lpsre"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:48Z",
                "name": "backplane-mcs-tier-two-c0",
                "resourceVersion": "5556",
                "uid": "4dc0a234-5803-4bd2-be7f-fd1599f44843"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-mcs-tier-two-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:48Z",
                "name": "backplane-mcs-tier-two-c1",
                "resourceVersion": "5587",
                "uid": "7d75a506-3c74-4224-b0dd-a778a5987445"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mcs-tier-two"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:57Z",
                "name": "backplane-mobb-c0",
                "resourceVersion": "5790",
                "uid": "4791c55c-2698-4cd9-a65b-38ba2891be1e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-mobb-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:57Z",
                "name": "backplane-mobb-c1",
                "resourceVersion": "5793",
                "uid": "8f4cdc76-4cda-464f-ac50-06a8ed833121"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-mobb"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:32Z",
                "name": "backplane-srep-c0",
                "resourceVersion": "5145",
                "uid": "6055a244-0e53-4c49-84f4-6bc01960e703"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:32Z",
                "name": "backplane-srep-c1",
                "resourceVersion": "5147",
                "uid": "02fec382-d67b-4d4a-aced-f7c42606092a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:24Z",
                "name": "backplane-srep-ro-c0",
                "resourceVersion": "4970",
                "uid": "0b19ee88-3d30-4f56-b55d-2b200d8e4d6a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-srep-ro-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:24Z",
                "name": "backplane-srep-ro-c1",
                "resourceVersion": "4972",
                "uid": "a7a0fd20-68ce-4db7-94f6-1d660cb1ce29"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-srep-ro"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:09Z",
                "name": "backplane-tam-c0",
                "resourceVersion": "6165",
                "uid": "1156a428-d20a-41be-984f-a8710a94e200"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-tam-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:09Z",
                "name": "backplane-tam-c1",
                "resourceVersion": "6168",
                "uid": "c4c10ad1-79de-4029-a2b0-d7041da10714"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "backplane-readers-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-tam"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "basic-users",
                "resourceVersion": "413",
                "uid": "d4baf09b-4810-4ec7-9740-4c8f87048896"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "basic-user"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-maintainers\"},\"name\":\"build-maintainers\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"build-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-build\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:40:59Z",
                "name": "build-maintainers",
                "resourceVersion": "21083",
                "uid": "92380037-da59-49e6-9029-5bb6b28ffe00"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "build-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-build"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-pipeline-runner-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-pipeline-runner-rolebinding\"},\"name\":\"build-pipeline-runner-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"appstudio-pipelines-runner\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"build-service-controller-manager\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:40:59Z",
                "name": "build-pipeline-runner-rolebinding",
                "resourceVersion": "21084",
                "uid": "26a04ea4-55a8-49ce-af7a-2f159437a57a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "appstudio-pipelines-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-service-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-service-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"build-service\"},\"name\":\"build-service-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"build-service-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"build-service-controller-manager\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:40:59Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "build-service"
                },
                "name": "build-service-manager-rolebinding",
                "resourceVersion": "21088",
                "uid": "b2453069-2580-46d3-985f-27898599494a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "build-service-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-service-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/build-service-metrics-auth-rolebinding\"},\"name\":\"build-service-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"build-service-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"build-service-controller-manager\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:40:59Z",
                "name": "build-service-metrics-auth-rolebinding",
                "resourceVersion": "21086",
                "uid": "e8c59633-afc2-4b3e-a732-f699335e1427"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "build-service-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-service-controller-manager",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:41:59Z",
                "labels": {
                    "app": "cainjector",
                    "app.kubernetes.io/component": "cainjector",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cainjector",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-cainjector",
                "resourceVersion": "26561",
                "uid": "997826cd-6337-49b6-a9b1-d9b659ec0519"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-cainjector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-cainjector",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:14Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "cert-manager",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-approve:cert-manager-io",
                "resourceVersion": "28443",
                "uid": "23ed85e1-ebd7-482d-b6ba-b36912af36ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-approve:cert-manager-io"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:00Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-certificates",
                "resourceVersion": "26795",
                "uid": "759de911-e677-4da3-b078-c55fd735f66f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-certificates"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:15Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "cert-manager",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-certificatesigningrequests",
                "resourceVersion": "28486",
                "uid": "756dca58-da21-4f1d-9228-e567afb89afc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-certificatesigningrequests"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:02Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-challenges",
                "resourceVersion": "27153",
                "uid": "95c82923-7959-4e89-a6fe-05e139ec7ae6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-challenges"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:03Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-clusterissuers",
                "resourceVersion": "27360",
                "uid": "2976eb65-c8d5-4969-aca5-fbdeec553b40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-clusterissuers"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:05Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-ingress-shim",
                "resourceVersion": "27640",
                "uid": "a3318187-ff67-42c6-a1ad-d3b29cd2e9d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-ingress-shim"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:06Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-issuers",
                "resourceVersion": "27807",
                "uid": "2b33203a-1ba0-49ad-8188-d6ef6dcd1966"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-issuers"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:07Z",
                "labels": {
                    "app": "cert-manager",
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "cert-manager",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-controller-orders",
                "resourceVersion": "27910",
                "uid": "7b7c59ec-512e-4434-95f0-2de626b60bb1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-controller-orders"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:41:49Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "cert-manager-operator.v1.19.0",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "cert-manager-operator",
                    "olm.permissions.hash": "36mkiMkmVRH2ejto46kKtoZUuW53wsw7UORYy7",
                    "operators.coreos.com/openshift-cert-manager-operator.cert-manager-operator": ""
                },
                "name": "cert-manager-operator.v1-7c4vxSxa58nP2OcmCxGf7QawTQBgsBwclPRGuB",
                "resourceVersion": "27536",
                "uid": "ba01b067-66ef-44cc-badb-2cbd22b34a34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-operator.v1-7c4vxSxa58nP2OcmCxGf7QawTQBgsBwclPRGuB"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-operator-controller-manager",
                    "namespace": "cert-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:01Z",
                "labels": {
                    "app": "webhook",
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "cert-manager",
                    "app.kubernetes.io/name": "webhook",
                    "app.kubernetes.io/version": "v1.19.4"
                },
                "name": "cert-manager-webhook:subjectaccessreviews",
                "resourceVersion": "27078",
                "uid": "a6363dac-5932-4176-a40a-e1c495635073"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cert-manager-webhook:subjectaccessreviews"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cert-manager-webhook",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CloudCredential",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:33Z",
                "name": "cloud-credential-operator-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "783",
                "uid": "967b84c7-e38c-414b-83ca-6efa2f7dccb3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cloud-credential-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-credential-operator",
                    "namespace": "openshift-cloud-credential-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:02Z",
                "name": "cloud-network-config-controller",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "2280",
                "uid": "b7f7dbbc-96bd-4fe0-8fb2-453cca2fc740"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cloud-network-config-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cloud-network-config-controller",
                    "namespace": "openshift-cloud-network-config-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "cluster-admin",
                "resourceVersion": "209",
                "uid": "6ee66523-f44f-4c48-b5ab-37d4a913ffd4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:masters"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "cluster-admins",
                "resourceVersion": "411",
                "uid": "e16e89e4-5931-4b29-a054-a20aca2ba910"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:cluster-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:40Z",
                "labels": {
                    "k8s-addon": "cluster-autoscaler.addons.k8s.io",
                    "k8s-app": "cluster-autoscaler"
                },
                "name": "cluster-autoscaler",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1112",
                "uid": "c039c12c-1b1f-44df-9c3f-0b3785dab087"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:35Z",
                "name": "cluster-autoscaler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "904",
                "uid": "c94eac57-958b-4eef-96c8-97e99bbae3fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-autoscaler-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-autoscaler-operator",
                    "namespace": "openshift-machine-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:48Z",
                "name": "cluster-monitoring-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1366",
                "uid": "1495ed54-ab07-4dad-abe1-4ac91045d005"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-monitoring-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:37Z",
                "name": "cluster-network-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1010",
                "uid": "2f5e56e7-6b2f-4887-a412-e8a1b6a7f785"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-network-operator",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:48Z",
                "name": "cluster-node-tuning-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1430",
                "uid": "a712128e-ed62-495c-9d26-223b23450b59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-node-tuning-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-node-tuning-operator",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "NodeTuning",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:50Z",
                "name": "cluster-node-tuning:tuned",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1641",
                "uid": "11e3239b-dc5f-4da7-a7e7-af22cc7e5127"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-node-tuning:tuned"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tuned",
                    "namespace": "openshift-cluster-node-tuning-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "cluster-readers",
                "resourceVersion": "412",
                "uid": "bb34329a-ca5f-49f9-91ea-ff505fcc7d8f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:cluster-readers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:50Z",
                "name": "cluster-samples-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1635",
                "uid": "7e696b56-f730-4864-a08c-af88a53fb2d7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-samples-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:45Z",
                "name": "cluster-samples-operator-imageconfig-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1226",
                "uid": "82a4d6fd-b906-4702-86ab-5f1beaa027d6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-samples-operator-imageconfig-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "openshift-samples",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:46Z",
                "name": "cluster-samples-operator-proxy-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1289",
                "uid": "414991ad-0db2-4df9-a752-ccc2ab50a660"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-samples-operator-proxy-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-samples-operator",
                    "namespace": "openshift-cluster-samples-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "cluster-status-binding",
                "resourceVersion": "417",
                "uid": "cffe30d6-ddc7-433b-b8f4-5520a49ca6ea"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-status"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Storage",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:36Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "cluster-storage-operator-role",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "983",
                "uid": "279427ba-6e80-490f-bcf2-c6207d11a570"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-storage-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"include.release.openshift.io/self-managed-high-availability\":\"true\",\"kubernetes.io/description\":\"Grant the cluster-version operator permission to perform cluster-admin actions while managing the OpenShift core.\"},\"name\":\"cluster-version-operator\"},\"roleRef\":{\"kind\":\"ClusterRole\",\"name\":\"cluster-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"default\",\"namespace\":\"openshift-cluster-version\"}]}\n",
                    "kubernetes.io/description": "Grant the cluster-version operator permission to perform cluster-admin actions while managing the OpenShift core."
                },
                "creationTimestamp": "2026-05-13T20:13:24Z",
                "name": "cluster-version-operator",
                "resourceVersion": "496",
                "uid": "0a6d5ad8-4fb7-402f-b2be-8c7ef8e82418"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-cluster-version"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:54Z",
                "name": "console",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1988",
                "uid": "59559f7b-d36a-4d74-a2db-1952e754b4a9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:54Z",
                "name": "console-auth-delegator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "2006",
                "uid": "6a2cbdf5-511a-4b41-91b6-8c7797cae1b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console",
                    "namespace": "openshift-console"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:53Z",
                "name": "console-extensions-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1976",
                "uid": "9b865276-2fb8-454b-8762-ca657036cb59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console-extensions-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:53Z",
                "name": "console-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1970",
                "uid": "cbdcb425-e0dd-411f-817b-95a4732d3001"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:53Z",
                "name": "console-operator-auth-delegator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1979",
                "uid": "0cfcabf2-0672-49bd-8e12-79637b880c5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-operator",
                    "namespace": "openshift-console-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/console-sa-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/console-sa-binding\",\"operator.min.io/authors\":\"MinIO, Inc.\",\"operator.min.io/license\":\"AGPLv3\",\"operator.min.io/support\":\"https://subnet.min.io\"},\"name\":\"console-sa-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"console-sa-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"console-sa\",\"namespace\":\"minio-operator\"}]}\n",
                    "operator.min.io/authors": "MinIO, Inc.",
                    "operator.min.io/license": "AGPLv3",
                    "operator.min.io/support": "https://subnet.min.io"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "console-sa-binding",
                "resourceVersion": "31308",
                "uid": "413c7719-228b-42d9-a312-b3d45488a3cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "console-sa-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "console-sa",
                    "namespace": "minio-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "create-csrs-for-bootstrapping",
                "resourceVersion": "1503",
                "uid": "f8f29aa2-a3cf-4464-959a-ee099f4a6f3c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-bootstrapper"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-machine-config-operator:node-bootstrapper"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane\"},\"labels\":{\"app\":\"crossplane\",\"app.kubernetes.io/component\":\"cloud-infrastructure-controller\",\"app.kubernetes.io/instance\":\"crossplane\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"crossplane\",\"app.kubernetes.io/part-of\":\"crossplane\",\"app.kubernetes.io/version\":\"2.2.0\",\"helm.sh/chart\":\"crossplane-2.2.0\"},\"name\":\"crossplane\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crossplane\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"crossplane\",\"namespace\":\"crossplane-system\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:12Z",
                "labels": {
                    "app": "crossplane",
                    "app.kubernetes.io/component": "cloud-infrastructure-controller",
                    "app.kubernetes.io/instance": "crossplane",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "crossplane",
                    "app.kubernetes.io/part-of": "crossplane",
                    "app.kubernetes.io/version": "2.2.0",
                    "helm.sh/chart": "crossplane-2.2.0"
                },
                "name": "crossplane",
                "resourceVersion": "22153",
                "uid": "4f74cea6-93f4-48a3-b583-eaa0ab017d75"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crossplane"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "crossplane",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane-admin",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane-admin\"},\"labels\":{\"app\":\"crossplane\",\"app.kubernetes.io/component\":\"cloud-infrastructure-controller\",\"app.kubernetes.io/instance\":\"crossplane\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"crossplane\",\"app.kubernetes.io/part-of\":\"crossplane\",\"app.kubernetes.io/version\":\"2.2.0\",\"helm.sh/chart\":\"crossplane-2.2.0\"},\"name\":\"crossplane-admin\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crossplane-admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"crossplane:masters\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:12Z",
                "labels": {
                    "app": "crossplane",
                    "app.kubernetes.io/component": "cloud-infrastructure-controller",
                    "app.kubernetes.io/instance": "crossplane",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "crossplane",
                    "app.kubernetes.io/part-of": "crossplane",
                    "app.kubernetes.io/version": "2.2.0",
                    "helm.sh/chart": "crossplane-2.2.0"
                },
                "name": "crossplane-admin",
                "resourceVersion": "22157",
                "uid": "baa52e27-ff92-42b6-8dad-9485d2ff4545"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crossplane-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "crossplane:masters"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane-rbac-manager",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/crossplane-rbac-manager\"},\"labels\":{\"app\":\"crossplane\",\"app.kubernetes.io/component\":\"cloud-infrastructure-controller\",\"app.kubernetes.io/instance\":\"crossplane\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"crossplane\",\"app.kubernetes.io/part-of\":\"crossplane\",\"app.kubernetes.io/version\":\"2.2.0\",\"helm.sh/chart\":\"crossplane-2.2.0\"},\"name\":\"crossplane-rbac-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crossplane-rbac-manager\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"rbac-manager\",\"namespace\":\"crossplane-system\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:12Z",
                "labels": {
                    "app": "crossplane",
                    "app.kubernetes.io/component": "cloud-infrastructure-controller",
                    "app.kubernetes.io/instance": "crossplane",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "crossplane",
                    "app.kubernetes.io/part-of": "crossplane",
                    "app.kubernetes.io/version": "2.2.0",
                    "helm.sh/chart": "crossplane-2.2.0"
                },
                "name": "crossplane-rbac-manager",
                "resourceVersion": "22170",
                "uid": "e3b02c81-ce8d-43f1-a9bc-e84de5b6a91c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crossplane-rbac-manager"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "rbac-manager",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:06Z",
                "name": "crossplane:provider:provider-kubernetes-f6665ef36536:system",
                "ownerReferences": [
                    {
                        "apiVersion": "pkg.crossplane.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "ProviderRevision",
                        "name": "provider-kubernetes-f6665ef36536",
                        "uid": "51601c34-9034-4b4a-b895-ac276472f49b"
                    }
                ],
                "resourceVersion": "28038",
                "uid": "939e5a51-096d-44d0-8656-58cdb7fcda80"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crossplane:provider:provider-kubernetes-f6665ef36536:system"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "provider-kubernetes",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:47Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-operator-clusterrole",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1340",
                "uid": "b6e349f4-a005-40ad-bd2f-bef65a332e2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "csi-snapshot-controller-operator-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:48Z",
                "labels": {
                    "addonmanager.kubernetes.io/mode": "Reconcile",
                    "kubernetes.io/cluster-service": "true"
                },
                "name": "csi-snapshot-controller-runner-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1413",
                "uid": "f8ba6ba3-79fb-4516-b9f9-2fe9064ac793"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-snapshot-controller-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller-operator",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:41Z",
                "name": "custom-account-openshift-machine-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1146",
                "uid": "fdb98784-18c5-400c-b59a-bec1e3a3f68d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-config-operator",
                    "namespace": "openshift-machine-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "monitoring-workload-custom-kube-state-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-monitoring/custom-kube-state-metrics",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"monitoring-workload-custom-kube-state-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-monitoring/custom-kube-state-metrics\"},\"name\":\"custom-kube-state-metrics\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"custom-kube-state-metrics\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"custom-kube-state-metrics\",\"namespace\":\"appstudio-monitoring\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "custom-kube-state-metrics",
                "resourceVersion": "26468",
                "uid": "87d9d9ae-ab57-4578-b806-4c96293ebf35"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "custom-kube-state-metrics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "custom-kube-state-metrics",
                    "namespace": "appstudio-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:23Z",
                "name": "dedicated-admin-serviceaccounts-c0",
                "resourceVersion": "4946",
                "uid": "08433fcb-48e5-4293-92bd-e5bb9b653695"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:24Z",
                "name": "dedicated-admins-c0",
                "resourceVersion": "4955",
                "uid": "64ba03f9-6f0a-471f-88e6-ed01b5bb8ec6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:49Z",
                "name": "dedicated-admins-cluster",
                "resourceVersion": "5605",
                "uid": "c47c52d8-95fd-4b31-b88a-69f846170656"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:58Z",
                "name": "dedicated-admins-registry-cas-cluster",
                "resourceVersion": "5802",
                "uid": "566543a7-a63e-4479-befd-5a45711c3cfa"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dedicated-admins-registry-cas-cluster"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:dedicated-admin"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "name": "default-account-cluster-image-registry-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1517",
                "uid": "23dae9ea-c94f-4059-bbb0-c6f5000b9ecd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-image-registry-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-image-registry-operator",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/delete-snapshots",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/delete-snapshots\"},\"name\":\"delete-snapshots\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"delete-snapshots\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "delete-snapshots",
                "resourceVersion": "26492",
                "uid": "195baddd-23e6-494f-acb6-77d6fbb8781a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "delete-snapshots"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:20Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "deployment-validation-operator.v0.1.595-gbf89fe8",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-deployment-validation-operator",
                    "olm.permissions.hash": "5skITWrLBOlbXhrBfE3G2s9UbRMxY4Z6yIM4Zm",
                    "operators.coreos.com/deployment-validation-operator.openshift-deployment-validation": ""
                },
                "name": "deployment-validation-op-3MPgHXAhudR419ZBRN97wNgaRvKjiTOnF1Hm8z",
                "resourceVersion": "11374",
                "uid": "50338e3f-a8af-430e-b14f-8b8292df0a4d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "deployment-validation-op-3MPgHXAhudR419ZBRN97wNgaRvKjiTOnF1Hm8z"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-validation-operator",
                    "namespace": "openshift-deployment-validation-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "name": "dns-monitoring",
                "resourceVersion": "1519",
                "uid": "2fdaaa6a-fc61-4ac8-9f2a-f15ebf286b7c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dns-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "dora-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:dora-metrics/dora-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"dora-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:dora-metrics/dora-metrics-reader\"},\"name\":\"dora-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"dora-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"dora-metrics-exporter-sa\",\"namespace\":\"dora-metrics\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:00Z",
                "name": "dora-metrics-reader",
                "resourceVersion": "21217",
                "uid": "6a3f8148-50a6-446c-91e9-a2e668f82d79"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dora-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dora-metrics-exporter-sa",
                    "namespace": "dora-metrics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:52Z",
                "name": "ebs-csi-main-attacher-binding",
                "resourceVersion": "1856",
                "uid": "e451e159-5bc0-4846-82c3-dee54111bacb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-attacher-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:50Z",
                "name": "ebs-csi-main-provisioner-binding",
                "resourceVersion": "1713",
                "uid": "a6f7b1aa-8dd0-4ac7-b738-3c821058452e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-provisioner-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:52Z",
                "name": "ebs-csi-main-resizer-binding",
                "resourceVersion": "1896",
                "uid": "10759a45-b37b-4047-b99e-36e263feb16c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-resizer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:51Z",
                "name": "ebs-csi-main-snapshotter-binding",
                "resourceVersion": "1746",
                "uid": "67413e3b-63bb-44ec-b468-97fb128ecd68"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-main-snapshotter-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:53Z",
                "name": "ebs-csi-storageclass-reader-resizer-binding",
                "resourceVersion": "1922",
                "uid": "8ff93eec-e8fe-4115-b4ca-c3b3f59cc23c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-resizer-storageclass-reader-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:52Z",
                "name": "ebs-csi-volumesnapshot-reader-provisioner-binding",
                "resourceVersion": "1824",
                "uid": "14c1aeb6-1f70-4354-b2c2-410a76333622"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-provisioner-volumesnapshot-reader-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-controller-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:51Z",
                "name": "ebs-node-privileged-binding",
                "resourceVersion": "1792",
                "uid": "3ed0e87b-3bbb-4567-a926-58506e924c53"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "ebs-privileged-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "aws-ebs-csi-driver-node-sa",
                    "namespace": "openshift-cluster-csi-drivers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller",
                "resourceVersion": "24530",
                "uid": "ea3312e9-995c-4cdd-b303-d4bfc5a8600f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-crossnamespace-subscriber",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-crossnamespace-subscriber\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller-crossnamespace-subscriber\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crossnamespace-subscriber\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller-crossnamespace-subscriber",
                "resourceVersion": "24532",
                "uid": "a0cec108-1a00-44d0-bd05-73d0862198db"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crossnamespace-subscriber"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-manipulator",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-manipulator\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller-manipulator\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"channelable-manipulator\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller-manipulator",
                "resourceVersion": "24537",
                "uid": "8de2057c-5b85-4969-b73a-825a54e9a156"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "channelable-manipulator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-resolver",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-resolver\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller-resolver\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"addressable-resolver\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller-resolver",
                "resourceVersion": "24539",
                "uid": "810b544d-08ec-4fd1-8a07-1b305db4fa2f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "addressable-resolver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-source-observer",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-source-observer\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller-source-observer\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"source-observer\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller-source-observer",
                "resourceVersion": "24548",
                "uid": "c0c0119c-3b92-45ae-bb43-37763330efae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "source-observer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-sources-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-controller-sources-controller\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-controller-sources-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-sources-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-controller-sources-controller",
                "resourceVersion": "24547",
                "uid": "8905b2fe-12e5-4d59-8285-752ada0b01f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-sources-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-mt-channel-broker-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-mt-channel-broker-controller\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-mt-channel-broker-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-mt-channel-broker-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-mt-channel-broker-controller",
                "resourceVersion": "24551",
                "uid": "015784ee-7598-47b7-a6ff-cf33e22438a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-mt-channel-broker-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-webhook\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-webhook\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-webhook\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-webhook",
                "resourceVersion": "24567",
                "uid": "f0261884-5a64-4aed-aadd-d8d267d4c08f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-webhook",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook-podspecable-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook-podspecable-binding\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-webhook-podspecable-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"podspecable-binding\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-webhook\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-webhook-podspecable-binding",
                "resourceVersion": "24550",
                "uid": "ae767e2d-e6fa-425e-ab50-3a3f6f91be49"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "podspecable-binding"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-webhook",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook-resolver",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/eventing-webhook-resolver\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"eventing-webhook-resolver\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"addressable-resolver\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"eventing-webhook\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "eventing-webhook-resolver",
                "resourceVersion": "24559",
                "uid": "990b7b94-2df8-44fa-98a8-c37657d83f3e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "addressable-resolver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "eventing-webhook",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:39:17Z",
                "name": "gitops-service-cluster",
                "ownerReferences": [
                    {
                        "apiVersion": "pipelines.openshift.io/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "GitopsService",
                        "name": "cluster",
                        "uid": "1fd736df-86b5-4ce5-aca3-30f0dded8d2e"
                    }
                ],
                "resourceVersion": "18377",
                "uid": "09ba15ef-a89a-45bf-9a44-50431be17d6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "gitops-service-cluster"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "gitops-service-cluster",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/grafana-clusterrolebinding",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/grafana-clusterrolebinding\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"labels\":{\"app.kubernetes.io/instance\":\"grafana\",\"app.kubernetes.io/name\":\"grafana\",\"app.kubernetes.io/version\":\"12.4.3\",\"helm.sh/chart\":\"grafana-11.6.1\"},\"name\":\"grafana-clusterrolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"grafana-clusterrole\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"grafana\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:47:26Z",
                "labels": {
                    "app.kubernetes.io/instance": "grafana",
                    "app.kubernetes.io/name": "grafana",
                    "app.kubernetes.io/version": "12.4.3",
                    "helm.sh/chart": "grafana-11.6.1"
                },
                "name": "grafana-clusterrolebinding",
                "resourceVersion": "39972",
                "uid": "c4a504b1-ffe1-4cb2-83b6-5f4976493769"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "grafana-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "grafana",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "application-api-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-api/grant-argocd-crd-permissions-for-application-api",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"application-api-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-api/grant-argocd-crd-permissions-for-application-api\"},\"name\":\"grant-argocd-crd-permissions-for-application-api\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crd-manager-for-application-api\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"application-api\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:12Z",
                "name": "grant-argocd-crd-permissions-for-application-api",
                "resourceVersion": "22150",
                "uid": "7f046da3-eb48-41fe-b0d3-cbc7edf9776d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crd-manager-for-application-api"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "application-api"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/grant-argocd-crd-permissions-for-has",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"has-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:application-service/grant-argocd-crd-permissions-for-has\"},\"name\":\"grant-argocd-crd-permissions-for-has\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crd-manager-for-has\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:13Z",
                "name": "grant-argocd-crd-permissions-for-has",
                "resourceVersion": "22293",
                "uid": "82242590-cb40-4d51-9ab9-379d6d63d577"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crd-manager-for-has"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/grant-argocd-crd-permissions-for-integration",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/grant-argocd-crd-permissions-for-integration\"},\"name\":\"grant-argocd-crd-permissions-for-integration\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crd-manager-for-integration\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "grant-argocd-crd-permissions-for-integration",
                "resourceVersion": "26494",
                "uid": "72847350-fd49-4c76-80c7-6686d72320e9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crd-manager-for-integration"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/grant-argocd-crd-permissions-for-project-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/grant-argocd-crd-permissions-for-project-controller\"},\"name\":\"grant-argocd-crd-permissions-for-project-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"crd-manager-for-project-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:27Z",
                "name": "grant-argocd-crd-permissions-for-project-controller",
                "resourceVersion": "23212",
                "uid": "7848b68b-0aa0-4784-8da0-bb7be0982b8e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crd-manager-for-project-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/grant-argocd-crd-permissions-for-release"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "grant-argocd-crd-permissions-for-release",
                "resourceVersion": "27511",
                "uid": "ad98a430-634b-46aa-bdfd-052f3b36b486"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "crd-manager-for-release"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{},\"name\":\"hcco-cluster-admin\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"cluster-admin\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"User\",\"name\":\"system:hosted-cluster-config\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "name": "hcco-cluster-admin",
                "resourceVersion": "137",
                "uid": "4fe87741-9ccc-41d8-adc4-9c6a37b0274f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:hosted-cluster-config"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Console",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true",
                    "release.openshift.io/create-only": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:54Z",
                "name": "helm-chartrepos-view",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1996",
                "uid": "6ca36bc0-366a-4184-bf9c-28fa4bc8fdba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "helm-chartrepos-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "hypershift-metrics-client",
                "resourceVersion": "1509",
                "uid": "a47b0f62-d56f-464c-814a-d3c247f3a61c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:hypershift:prometheus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-maintainers\"},\"name\":\"image-controller-maintainers\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"image-controller-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-build\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:15Z",
                "name": "image-controller-maintainers",
                "resourceVersion": "22543",
                "uid": "03f70c13-685b-49a6-ad30-f2effa8d9316"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-controller-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-build"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"image-controller\"},\"name\":\"image-controller-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"image-controller-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"image-controller-controller-manager\",\"namespace\":\"image-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:15Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "image-controller"
                },
                "name": "image-controller-manager-rolebinding",
                "resourceVersion": "22541",
                "uid": "260f9362-45a7-4fb9-b9eb-8023f85450cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-controller-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-controller-controller-manager",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/image-controller-metrics-auth-rolebinding\"},\"name\":\"image-controller-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"image-controller-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"image-controller-controller-manager\",\"namespace\":\"image-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:15Z",
                "name": "image-controller-metrics-auth-rolebinding",
                "resourceVersion": "22542",
                "uid": "728d801e-8ea8-42c9-9df9-a5ab7d74e8b4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-controller-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-controller-controller-manager",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-rbac-proxy/image-proxy-dex",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-rbac-proxy/image-proxy-dex\"},\"name\":\"image-proxy-dex\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"image-proxy-dex\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"dex\",\"namespace\":\"image-rbac-proxy\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:02Z",
                "name": "image-proxy-dex",
                "resourceVersion": "21434",
                "uid": "814a46d4-97cb-427a-8e40-c8c13da3cbb5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-proxy-dex"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dex",
                    "namespace": "image-rbac-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-rbac-proxy/image-rbac-proxy",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-rbac-proxy-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-rbac-proxy/image-rbac-proxy\"},\"name\":\"image-rbac-proxy\"},\"roleRef\":{\"kind\":\"ClusterRole\",\"name\":\"image-rbac-proxy\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"image-rbac-proxy\",\"namespace\":\"image-rbac-proxy\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:02Z",
                "name": "image-rbac-proxy",
                "resourceVersion": "21433",
                "uid": "8d952577-d1f4-47ca-a421-858265041735"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-rbac-proxy"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-rbac-proxy",
                    "namespace": "image-rbac-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-controller",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-controller\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"imc-controller\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"imc-controller\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"imc-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "imc-controller",
                "resourceVersion": "24561",
                "uid": "4a17fb7d-d3c7-4ad9-87c5-09b4d414573e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "imc-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "imc-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-controller-resolver",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-controller-resolver\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"imc-controller-resolver\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"addressable-resolver\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"imc-controller\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "imc-controller-resolver",
                "resourceVersion": "24560",
                "uid": "3582a1fb-a523-4b98-bccf-3834afed5a11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "addressable-resolver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "imc-controller",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-dispatcher",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/imc-dispatcher\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"imc-dispatcher\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"imc-dispatcher\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"imc-dispatcher\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "imc-dispatcher",
                "resourceVersion": "24568",
                "uid": "80411061-1dca-44d4-8f7f-d570bdfd9963"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "imc-dispatcher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "imc-dispatcher",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:47Z",
                "name": "insights-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1344",
                "uid": "47fffca5-1c45-4eef-ae49-26b25a0f330b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "insights-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:32Z",
                "name": "insights-operator-auth",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "745",
                "uid": "97a5fb5e-8f96-45de-9698-8cff3dca36bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "operator",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "name": "insights-operator-gather",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1478",
                "uid": "c3ee6b20-4a58-457c-b5d6-67eb51aaeaa3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "insights-operator-gather"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "gather",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Insights",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "name": "insights-operator-gather-reader",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1545",
                "uid": "705149e1-05c5-4547-b785-f57840d3f984"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "gather",
                    "namespace": "openshift-insights"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "policies-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-policies/integration-kyverno-background:konflux-integration-runner"
                },
                "creationTimestamp": "2026-05-13T20:46:57Z",
                "name": "integration-kyverno-background:konflux-integration-runner",
                "resourceVersion": "39187",
                "uid": "97bbd5d9-ec40-42cc-a0e0-9c04cc149692"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-integration-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-manager-rolebinding\"},\"name\":\"integration-service-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"integration-service-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-controller-manager\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "integration-service-manager-rolebinding",
                "resourceVersion": "26496",
                "uid": "69b24804-058f-49f5-84c3-065a895b176f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "integration-service-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-metrics-auth-rolebinding\"},\"name\":\"integration-service-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"integration-service-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-controller-manager\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "integration-service-metrics-auth-rolebinding",
                "resourceVersion": "26497",
                "uid": "4c80eeb8-523a-436a-9b4d-3c5cbd26cec7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "integration-service-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-prometheus-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-prometheus-role-binding\"},\"name\":\"integration-service-prometheus-role-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"integration-service-prometheus-viewer-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-metrics-reader\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "integration-service-prometheus-role-binding",
                "resourceVersion": "26500",
                "uid": "b70f23b1-8e0b-4b1b-a86f-26e341d8d95d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "integration-service-prometheus-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-metrics-reader",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-snapshot-garbage-collector",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-snapshot-garbage-collector\"},\"name\":\"integration-service-snapshot-garbage-collector\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"integration-service-snapshot-garbage-collector\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-snapshot-garbage-collector\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "integration-service-snapshot-garbage-collector",
                "resourceVersion": "26495",
                "uid": "6d2bf00f-1b88-4a87-84ff-bdebba08ffc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "integration-service-snapshot-garbage-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-snapshot-garbage-collector",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-tekton-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/integration-service-tekton-role-binding\"},\"name\":\"integration-service-tekton-role-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"integration-service-tekton-editor-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"integration-service-controller-manager\",\"namespace\":\"integration-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "integration-service-tekton-role-binding",
                "resourceVersion": "26514",
                "uid": "05fa52cb-759e-4fe7-b47f-e5956fb60b5f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "integration-service-tekton-editor-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "integration-service-controller-manager",
                    "namespace": "integration-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "internal-services-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:internal-services/internal-service-request-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"internal-services-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:internal-services/internal-service-request-role-binding\"},\"name\":\"internal-service-request-role-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"internal-service-request-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"internal-service-request-service-account\",\"namespace\":\"internal-services\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "internal-service-request-role-binding",
                "resourceVersion": "26469",
                "uid": "c315a96a-7f30-4443-8d3f-8464be8104ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "internal-service-request-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "internal-service-request-service-account",
                    "namespace": "internal-services"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "internal-services-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:internal-services/internal-services",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"internal-services-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:internal-services/internal-services\"},\"name\":\"internal-services\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"internal-service-request-role\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-release-team\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "internal-services",
                "resourceVersion": "26478",
                "uid": "8b8cb9e8-8fa9-4aac-b20c-2b8c632088cf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "internal-service-request-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-release-team"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-job-sink",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-job-sink\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"knative-eventing-job-sink\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-job-sink\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"job-sink\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "knative-eventing-job-sink",
                "resourceVersion": "24570",
                "uid": "77eefd73-25d7-40a5-b34a-2a09340449c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-job-sink"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "job-sink",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-mt-broker-filter",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-mt-broker-filter\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"knative-eventing-mt-broker-filter\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-mt-broker-filter\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mt-broker-filter\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "knative-eventing-mt-broker-filter",
                "resourceVersion": "24569",
                "uid": "f6eff4f1-58fc-4bec-9179-3b439f87c24c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-mt-broker-filter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mt-broker-filter",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-mt-broker-ingress",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-mt-broker-ingress\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"knative-eventing-mt-broker-ingress\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-mt-broker-ingress\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mt-broker-ingress\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "knative-eventing-mt-broker-ingress",
                "resourceVersion": "24578",
                "uid": "76d6a9fb-1645-46a3-856c-cd5ce239b607"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-mt-broker-ingress"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mt-broker-ingress",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-pingsource-mt-adapter",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"knative-eventing-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:knative-eventing/knative-eventing-pingsource-mt-adapter\"},\"labels\":{\"app.kubernetes.io/name\":\"knative-eventing\",\"app.kubernetes.io/version\":\"1.16.7\"},\"name\":\"knative-eventing-pingsource-mt-adapter\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"knative-eventing-pingsource-mt-adapter\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pingsource-mt-adapter\",\"namespace\":\"knative-eventing\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/name": "knative-eventing",
                    "app.kubernetes.io/version": "1.16.7"
                },
                "name": "knative-eventing-pingsource-mt-adapter",
                "resourceVersion": "24575",
                "uid": "44ad8734-95d3-4ef9-b0ee-04dee84c1e40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "knative-eventing-pingsource-mt-adapter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pingsource-mt-adapter",
                    "namespace": "knative-eventing"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "konflux-kite-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kite/konflux-kite-authorizer",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"konflux-kite-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kite/konflux-kite-authorizer\"},\"name\":\"konflux-kite-authorizer\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"konflux-kite-authorizer\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"konflux-kite\",\"namespace\":\"konflux-kite\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:04Z",
                "name": "konflux-kite-authorizer",
                "resourceVersion": "21614",
                "uid": "bce94832-aa78-4c83-861c-bf62a9696733"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-kite-authorizer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "konflux-kite",
                    "namespace": "konflux-kite"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kyverno/konflux-kyverno:admission-controller"
                },
                "creationTimestamp": "2026-05-13T20:44:09Z",
                "labels": {
                    "app.kubernetes.io/component": "admission-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:admission-controller",
                "resourceVersion": "33702",
                "uid": "47bfaad5-959a-4180-b742-e760786c13a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-kyverno:admission-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-admission-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kyverno/konflux-kyverno:admission-controller:view"
                },
                "creationTimestamp": "2026-05-13T20:44:09Z",
                "labels": {
                    "app.kubernetes.io/component": "admission-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:admission-controller:view",
                "resourceVersion": "33707",
                "uid": "f3c1a4e1-8951-4359-91a3-b87e6ed5b16a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-admission-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kyverno/konflux-kyverno:background-controller"
                },
                "creationTimestamp": "2026-05-13T20:44:09Z",
                "labels": {
                    "app.kubernetes.io/component": "background-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:background-controller",
                "resourceVersion": "33706",
                "uid": "29c454ef-c664-492c-807a-724d6edfe1bf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-kyverno:background-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kyverno/konflux-kyverno:background-controller:view"
                },
                "creationTimestamp": "2026-05-13T20:44:09Z",
                "labels": {
                    "app.kubernetes.io/component": "background-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:background-controller:view",
                "resourceVersion": "33704",
                "uid": "91b981fe-4448-432c-807e-8ef054c984a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kyverno-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-kyverno/konflux-kyverno:cleanup-controller"
                },
                "creationTimestamp": "2026-05-13T20:44:09Z",
                "labels": {
                    "app.kubernetes.io/component": "cleanup-controller",
                    "app.kubernetes.io/instance": "kyverno",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/part-of": "konflux-kyverno",
                    "app.kubernetes.io/version": "3.5.2",
                    "helm.sh/chart": "kyverno-3.5.2"
                },
                "name": "konflux-kyverno:cleanup-controller",
                "resourceVersion": "33703",
                "uid": "5f0c1e5a-a76a-4c0c-ac4d-76b11f90ee55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-kyverno:cleanup-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-cleanup-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "policies-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-policies/konflux-rbac-kyverno-background:konflux-viewer-user-actions-support"
                },
                "creationTimestamp": "2026-05-13T20:46:57Z",
                "name": "konflux-rbac-kyverno-background:konflux-viewer-user-actions-support",
                "resourceVersion": "39186",
                "uid": "2629f07d-6b50-4454-aeb8-eab682f1b862"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "konflux-viewer-user-actions"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kyverno-background-controller",
                    "namespace": "konflux-kyverno"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "monitoring-workload-prometheus-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-workload-monitoring/kube-rbac-proxy",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"monitoring-workload-prometheus-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-workload-monitoring/kube-rbac-proxy\"},\"name\":\"kube-rbac-proxy\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kube-rbac-proxy\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"kube-rbac-proxy\",\"namespace\":\"dummy-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "kube-rbac-proxy",
                "resourceVersion": "26479",
                "uid": "f469cd9f-c1db-41bc-acb1-a19b7747c638"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kube-rbac-proxy"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-rbac-proxy",
                    "namespace": "dummy-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:27Z",
                "labels": {
                    "app.kubernetes.io/component": "exporter",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "kube-state-metrics",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.13.0"
                },
                "name": "kube-state-metrics",
                "resourceVersion": "11483",
                "uid": "0ec05170-a0f0-4208-bea1-622fac92ca41"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kube-state-metrics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-state-metrics",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-api-server",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-api-server\"},\"labels\":{\"app.kubernetes.io/component\":\"api-server\",\"app.kubernetes.io/name\":\"kubearchive-api-server\",\"app.kubernetes.io/part-of\":\"kubearchive\",\"app.kubernetes.io/version\":\"v1.21.4\"},\"name\":\"kubearchive-api-server\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kubearchive-api-server\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"kubearchive-api-server\",\"namespace\":\"product-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:08Z",
                "labels": {
                    "app.kubernetes.io/component": "api-server",
                    "app.kubernetes.io/name": "kubearchive-api-server",
                    "app.kubernetes.io/part-of": "kubearchive",
                    "app.kubernetes.io/version": "v1.21.4"
                },
                "name": "kubearchive-api-server",
                "resourceVersion": "30803",
                "uid": "12f3d29e-d0e8-4309-a41c-7d5120e61732"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-api-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-api-server",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-maintainers",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-maintainers\"},\"name\":\"kubearchive-maintainers\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kubearchive-maintainer\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:08Z",
                "name": "kubearchive-maintainers",
                "resourceVersion": "30796",
                "uid": "b3233687-8f05-4f4e-97aa-8bd392a23865"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-maintainer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-operator",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-operator\"},\"labels\":{\"app.kubernetes.io/component\":\"operator\",\"app.kubernetes.io/name\":\"kubearchive-operator\",\"app.kubernetes.io/part-of\":\"kubearchive\",\"app.kubernetes.io/version\":\"v1.21.4\"},\"name\":\"kubearchive-operator\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kubearchive-operator\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"kubearchive-operator\",\"namespace\":\"product-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:08Z",
                "labels": {
                    "app.kubernetes.io/component": "operator",
                    "app.kubernetes.io/name": "kubearchive-operator",
                    "app.kubernetes.io/part-of": "kubearchive",
                    "app.kubernetes.io/version": "v1.21.4"
                },
                "name": "kubearchive-operator",
                "resourceVersion": "30810",
                "uid": "d38843d3-3978-4698-8c5e-5156d41d2463"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-operator",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-otel-collector-auth-delegator",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/kubearchive-otel-collector-auth-delegator\"},\"name\":\"kubearchive-otel-collector-auth-delegator\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"system:auth-delegator\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"kubearchive-otel-collector\",\"namespace\":\"product-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:08Z",
                "name": "kubearchive-otel-collector-auth-delegator",
                "resourceVersion": "30811",
                "uid": "10f25529-e478-4751-8336-64b047273216"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-otel-collector",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:43:24Z",
                "name": "kubearchive-sinkfilter",
                "resourceVersion": "31792",
                "uid": "5b0d3d2e-5b9d-4903-89bc-7eb8b4745981"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-sinkfilter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kubearchive-operator",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/hook": "PreSync",
                    "argocd.argoproj.io/hook-delete-policy": "BeforeHookCreation",
                    "argocd.argoproj.io/tracking-id": "policies-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-policies/kueue-crd-checker"
                },
                "creationTimestamp": "2026-05-13T20:44:51Z",
                "name": "kueue-crd-checker",
                "resourceVersion": "34968",
                "uid": "d7b85049-a832-469c-a4a2-38fd33cc22cb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-crd-checker"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-crd-checker",
                    "namespace": "konflux-policies"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:45:49Z",
                "labels": {
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-manager-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "ff49d668-4992-4967-8284-ad28e986a728"
                    }
                ],
                "resourceVersion": "37345",
                "uid": "68b44a5f-8ed2-4816-81f0-2ca22d1d4f4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:45:50Z",
                "labels": {
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-metrics-auth-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "ff49d668-4992-4967-8284-ad28e986a728"
                    }
                ],
                "resourceVersion": "37365",
                "uid": "5b5990b0-bd09-4283-9508-cd429fc3ec44"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:45:29Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-metrics-monitoring-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "ff49d668-4992-4967-8284-ad28e986a728"
                    }
                ],
                "resourceVersion": "36253",
                "uid": "8c1a5a6d-8ff7-421d-ab6f-9fca0cff3897"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus",
                    "namespace": "openshift-monitoring"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "default",
                    "namespace": "openshift-monitoring"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:45:50Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-metrics-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "ff49d668-4992-4967-8284-ad28e986a728"
                    }
                ],
                "resourceVersion": "37351",
                "uid": "9efd1628-90cb-43a8-81d5-7295312e0431"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:45:48Z",
                "name": "kueue-openshift-cluster-role-binding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "ff49d668-4992-4967-8284-ad28e986a728"
                    }
                ],
                "resourceVersion": "37331",
                "uid": "bed5cdd3-0352-4b2f-9397-43c7048b7d6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-openshift-roles"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:43:03Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "kueue-operator.v1.3.1",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-kueue-operator",
                    "olm.permissions.hash": "5LB1CwiYieC0QObficOLsgyBtkGvJrpP457V27",
                    "operators.coreos.com/kueue-operator.openshift-kueue-operator": ""
                },
                "name": "kueue-operator.v1.3.1-adIoh9OBFFYUD2GRfbZ3KnOAExhQw5kNCMMg3L",
                "resourceVersion": "30828",
                "uid": "e4974fb8-58e3-4ef1-91bf-6e037070edb4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-operator.v1.3.1-adIoh9OBFFYUD2GRfbZ3KnOAExhQw5kNCMMg3L"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-kueue-operator",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:43:04Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "kueue-operator.v1.3.1",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-kueue-operator",
                    "olm.permissions.hash": "7JQKXUsH3EPXXCggkNkECFfrcGIiHEYfxKx4u",
                    "operators.coreos.com/kueue-operator.openshift-kueue-operator": ""
                },
                "name": "kueue-operator.v1.3.1-op-ajhI9xeYndqitg2BSAoQ5xh94GcmxZKDH6HlzD",
                "resourceVersion": "30594",
                "uid": "b12d5bc8-4a68-46e0-82a7-6e8804e963a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-operator.v1.3.1-op-ajhI9xeYndqitg2BSAoQ5xh94GcmxZKDH6HlzD"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-kueue-operator",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:45:49Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/name": "kueue",
                    "control-plane": "controller-manager"
                },
                "name": "kueue-proxy-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "kueue.openshift.io/v1",
                        "kind": "Kueue",
                        "name": "cluster",
                        "uid": "ff49d668-4992-4967-8284-ad28e986a728"
                    }
                ],
                "resourceVersion": "37340",
                "uid": "ac511a19-566f-4998-87dc-7cf4df8a8143"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kueue-proxy-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kueue-controller-manager",
                    "namespace": "openshift-kueue-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/loki-clusterrolebinding",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/loki-clusterrolebinding\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"labels\":{\"app.kubernetes.io/instance\":\"loki\",\"app.kubernetes.io/name\":\"loki\",\"app.kubernetes.io/version\":\"3.7.1\",\"helm.sh/chart\":\"loki-12.0.0\"},\"name\":\"loki-clusterrolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"loki-clusterrole\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"loki\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:47:26Z",
                "labels": {
                    "app.kubernetes.io/instance": "loki",
                    "app.kubernetes.io/name": "loki",
                    "app.kubernetes.io/version": "3.7.1",
                    "helm.sh/chart": "loki-12.0.0"
                },
                "name": "loki-clusterrolebinding",
                "resourceVersion": "39967",
                "uid": "56c20ffd-7385-4f20-aa5e-0404710e0deb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "loki-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "loki",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/manage-integrationtestscenarios",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/manage-integrationtestscenarios\"},\"name\":\"manage-integrationtestscenarios\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"manage-integrationtestscenarios\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "manage-integrationtestscenarios",
                "resourceVersion": "26502",
                "uid": "c52936f4-cea8-45c6-9d6c-8a5f5a447f07"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "manage-integrationtestscenarios"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/manage-resolutionrequests",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/manage-resolutionrequests\"},\"name\":\"manage-resolutionrequests\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"manage-resolutionrequests\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "manage-resolutionrequests",
                "resourceVersion": "26504",
                "uid": "4b3907a5-0343-463e-a4c3-caa4eae7fc91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "manage-resolutionrequests"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:07Z",
                "name": "metrics-daemon-sa-rolebinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "2442",
                "uid": "6d285291-eb7c-41ca-b912-9616f279bd74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "metrics-daemon-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-daemon-sa",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:28Z",
                "labels": {
                    "app.kubernetes.io/component": "metrics-server",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "auth-delegator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "metrics-server:system:auth-delegator",
                "resourceVersion": "11599",
                "uid": "80cacf7e-eee6-416c-aaca-ee3629ae9a6c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/minio-operator-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/minio-operator-binding\",\"operator.min.io/authors\":\"MinIO, Inc.\",\"operator.min.io/license\":\"AGPLv3\",\"operator.min.io/support\":\"https://subnet.min.io\"},\"name\":\"minio-operator-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"minio-operator-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"minio-operator\",\"namespace\":\"minio-operator\"}]}\n",
                    "operator.min.io/authors": "MinIO, Inc.",
                    "operator.min.io/license": "AGPLv3",
                    "operator.min.io/support": "https://subnet.min.io"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "minio-operator-binding",
                "resourceVersion": "31309",
                "uid": "93938e02-27a4-4ecb-a549-50ecb38059c7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "minio-operator-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "minio-operator",
                    "namespace": "minio-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "mintmaker-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:mintmaker/mintmaker-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"mintmaker-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:mintmaker/mintmaker-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"mintmaker\"},\"name\":\"mintmaker-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"mintmaker-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mintmaker-controller-manager\",\"namespace\":\"mintmaker\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "mintmaker"
                },
                "name": "mintmaker-manager-rolebinding",
                "resourceVersion": "24514",
                "uid": "d2afb593-2fdc-4af5-a8ea-4cc97f06e16f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "mintmaker-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mintmaker-controller-manager",
                    "namespace": "mintmaker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "mintmaker-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:mintmaker/mintmaker-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"mintmaker-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:mintmaker/mintmaker-metrics-auth-rolebinding\"},\"name\":\"mintmaker-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"mintmaker-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"mintmaker-controller-manager\",\"namespace\":\"mintmaker\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:44Z",
                "name": "mintmaker-metrics-auth-rolebinding",
                "resourceVersion": "24521",
                "uid": "69142f5d-10c7-4ef2-b5a4-7bdd1f39f876"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "mintmaker-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "mintmaker-controller-manager",
                    "namespace": "mintmaker"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/modify-pipelineruns-taskruns",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"integration-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:integration-service/modify-pipelineruns-taskruns\"},\"name\":\"modify-pipelineruns-taskruns\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"modify-pipelineruns-taskruns\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-integration\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "modify-pipelineruns-taskruns",
                "resourceVersion": "26517",
                "uid": "51782db4-af0f-4842-a6b1-90b9dfc80c40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "modify-pipelineruns-taskruns"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-integration"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/multi-platform-controller-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/multi-platform-controller-manager-rolebinding\"},\"labels\":{\"app\":\"multi-platform-controller\"},\"name\":\"multi-platform-controller-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"multi-platform-controller-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"multi-platform-controller-controller-manager\",\"namespace\":\"multi-platform-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:47:25Z",
                "labels": {
                    "app": "multi-platform-controller"
                },
                "name": "multi-platform-controller-manager-rolebinding",
                "resourceVersion": "39939",
                "uid": "c731a1f1-8f85-43d2-85c3-2d0e54608449"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multi-platform-controller-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multi-platform-controller-controller-manager",
                    "namespace": "multi-platform-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/multi-platform-controller-proxy-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/multi-platform-controller-proxy-rolebinding\"},\"labels\":{\"app\":\"multi-platform-controller\"},\"name\":\"multi-platform-controller-proxy-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"multi-platform-controller-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"multi-platform-controller-controller-manager\",\"namespace\":\"multi-platform-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:47:25Z",
                "labels": {
                    "app": "multi-platform-controller"
                },
                "name": "multi-platform-controller-proxy-rolebinding",
                "resourceVersion": "39940",
                "uid": "619691f7-7abf-49cb-893c-1706ac9ef8e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multi-platform-controller-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multi-platform-controller-controller-manager",
                    "namespace": "multi-platform-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:08Z",
                "name": "multus-admission-controller-webhook",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "2516",
                "uid": "30b3dd97-2137-4406-b809-9963d10fddf3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-admission-controller-webhook"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ac",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:04Z",
                "name": "multus-ancillary-tools",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "2356",
                "uid": "404d749f-e66d-4941-88f9-952dd2a16203"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-ancillary-tools"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:04Z",
                "name": "multus-cluster-readers",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "2361",
                "uid": "0bfa352c-aca8-45b9-87b6-b3427a5545fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-ancillary-tools"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:cluster-readers"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:04Z",
                "name": "multus-group",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "2345",
                "uid": "dba672f5-30f6-416d-8a00-89147f349468"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:03Z",
                "name": "multus-transient",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "2338",
                "uid": "962d38f2-364d-4727-a3ae-ba2bfd649488"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multus-ancillary-tools"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:04Z",
                "name": "multus-whereabouts",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "2369",
                "uid": "96412b21-6793-4968-a199-da665b26c68e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "whereabouts-cni"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "multus-ancillary-tools",
                    "namespace": "openshift-multus"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/namespace-claim-cleaner",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/namespace-claim-cleaner\"},\"name\":\"namespace-claim-cleaner\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"namespace-claim-cleaner\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"namespace-claim-cleaner\",\"namespace\":\"crossplane-system\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:42:02Z",
                "name": "namespace-claim-cleaner",
                "resourceVersion": "27201",
                "uid": "cba2c71b-990e-4722-8998-ba068a9ea256"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "namespace-claim-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-claim-cleaner",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:18Z",
                "name": "network-diagnostics",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "3796",
                "uid": "3dcf1992-66f5-4a67-9186-0ea22135e5ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "network-diagnostics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-diagnostics",
                    "namespace": "openshift-network-diagnostics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:21Z",
                "name": "network-node-identity",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "3939",
                "uid": "8adc8d33-9e13-4514-82bb-8fb32e322421"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "network-node-identity"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "network-node-identity",
                    "namespace": "openshift-network-node-identity"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:27Z",
                "labels": {
                    "app.kubernetes.io/component": "exporter",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "node-exporter",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "1.8.2"
                },
                "name": "node-exporter",
                "resourceVersion": "11479",
                "uid": "3b1d530e-e1a6-49d8-8ac7-05ba0e13e264"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "node-exporter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-exporter",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:41:27Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "oadp-operator.v1.4.9",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-adp",
                    "olm.permissions.hash": "53Dxlas9kwJWPvCzV4LmVPTp0yaamAhjOi3Ejj",
                    "operators.coreos.com/redhat-oadp-operator.openshift-adp": ""
                },
                "name": "oadp-operator.v1.4.9-25YSSVpFw55rWAuyswAk0IvXHaVEpEezWdwWks",
                "resourceVersion": "25166",
                "uid": "a26cbf77-f167-4bc4-a327-640d0feb3feb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "oadp-operator.v1.4.9-25YSSVpFw55rWAuyswAk0IvXHaVEpEezWdwWks"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-adp-controller-manager",
                    "namespace": "openshift-adp"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:41:27Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "oadp-operator.v1.4.9",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-adp",
                    "olm.permissions.hash": "39jMkY8WxClFdoJvin8PMbEIsuS6GkzOl6l6oP",
                    "operators.coreos.com/redhat-oadp-operator.openshift-adp": ""
                },
                "name": "oadp-operator.v1.4.9-czOPdaX3elVKXRkPgSnp9lNhcTqLi9z3pDVyJC",
                "resourceVersion": "25272",
                "uid": "1f6b12c9-5a74-4b12-903c-65aa9af60c7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "oadp-operator.v1.4.9-czOPdaX3elVKXRkPgSnp9lNhcTqLi9z3pDVyJC"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "velero",
                    "namespace": "openshift-adp"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:24Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7"
                },
                "name": "open-cluster-management:klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-registration:addon-management",
                "resourceVersion": "4176",
                "uid": "cd51863f-7fbd-4bcc-95f4-e58502166e5d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-registration:addon-management"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-registration-sa",
                    "namespace": "open-cluster-management-2q98nmam3huh1jm6r0h7b832j668p6e7"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:24Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7"
                },
                "name": "open-cluster-management:klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-registration:agent",
                "resourceVersion": "4172",
                "uid": "2e69bc50-71a6-4670-86e5-dd7eee831256"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-registration:agent"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-registration-sa",
                    "namespace": "open-cluster-management-2q98nmam3huh1jm6r0h7b832j668p6e7"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:25Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7"
                },
                "name": "open-cluster-management:klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-work:agent",
                "resourceVersion": "4211",
                "uid": "4a9174ef-7f32-44a2-bd83-5179e07bfb65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-work:agent"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-work-sa",
                    "namespace": "open-cluster-management-2q98nmam3huh1jm6r0h7b832j668p6e7"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:25Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7"
                },
                "name": "open-cluster-management:klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-work:aggregate",
                "resourceVersion": "4215",
                "uid": "eca6af2b-6970-49da-958f-a6bc70d7276a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "open-cluster-management:klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-work:aggregate"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-work-sa",
                    "namespace": "open-cluster-management-2q98nmam3huh1jm6r0h7b832j668p6e7"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:25Z",
                "labels": {
                    "open-cluster-management.io/created-by-klusterlet": "klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7"
                },
                "name": "open-cluster-management:klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-work:execution-admin",
                "resourceVersion": "4217",
                "uid": "97d39771-965a-4101-af5b-4323192b6e12"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "klusterlet-2q98nmam3huh1jm6r0h7b832j668p6e7-work-sa",
                    "namespace": "open-cluster-management-2q98nmam3huh1jm6r0h7b832j668p6e7"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:04Z",
                "name": "openshift-backplane-managed-scripts-reader",
                "resourceVersion": "6009",
                "uid": "d1eaf4c7-0387-442b-80ac-aa4ae0f48b65"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-backplane-managed-scripts-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts:openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "CSISnapshot",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:40Z",
                "name": "openshift-csi-snapshot-controller-role",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1095",
                "uid": "00bfdc29-4ee8-4198-968c-aaa7c213e50d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-csi-snapshot-controller-runner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "csi-snapshot-controller",
                    "namespace": "openshift-cluster-storage-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:38Z",
                "name": "openshift-dns",
                "resourceVersion": "1048",
                "uid": "6022a829-10e2-4b64-b7cd-2490ac9e51e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-dns"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns",
                    "namespace": "openshift-dns"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:36Z",
                "name": "openshift-dns-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "958",
                "uid": "17b6adb3-3002-432b-b7f3-1c0f45ae3dae"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-dns-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "dns-operator",
                    "namespace": "openshift-dns-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-gitops-apply-tekton-config-parameters",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-gitops-apply-tekton-config-parameters\"},\"name\":\"openshift-gitops-apply-tekton-config-parameters\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"openshift-gitops-apply-tekton-config-parameters\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "openshift-gitops-apply-tekton-config-parameters",
                "resourceVersion": "31310",
                "uid": "78e189ba-e0e3-4568-ab9d-17cc76e94ee8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-apply-tekton-config-parameters"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-gitops-jobs-admin",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-gitops-jobs-admin\"},\"name\":\"openshift-gitops-jobs-admin\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"openshift-gitops-jobs-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "openshift-gitops-jobs-admin",
                "resourceVersion": "31311",
                "uid": "adf27643-37a9-4441-9ce5-1c8436c46717"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-jobs-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-13T20:39:18Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-application-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-openshift-gitops-argocd-application-controller",
                "resourceVersion": "18538",
                "uid": "0f525b82-9a86-4c8a-8eef-daed4de6d3dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-openshift-gitops-argocd-application-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-13T20:39:20Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-applicationset-controller",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-openshift-gitops-argocd-applicationset-controller",
                "resourceVersion": "18681",
                "uid": "bb18875e-c5a3-4115-b70c-f1c53d88668a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-openshift-gitops-argocd-applicationset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-applicationset-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocds.argoproj.io/name": "openshift-gitops",
                    "argocds.argoproj.io/namespace": "openshift-gitops"
                },
                "creationTimestamp": "2026-05-13T20:39:18Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "openshift-gitops",
                    "app.kubernetes.io/name": "argocd-server",
                    "app.kubernetes.io/part-of": "argocd"
                },
                "name": "openshift-gitops-openshift-gitops-argocd-server",
                "resourceVersion": "18539",
                "uid": "ae421062-4ca5-4b73-b357-d9e61e75ab98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-openshift-gitops-argocd-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-server",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:39:10Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.15.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "6KhHPV4xyDt614G88n3r92FxOjlGE53yyaLtC",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operato-5yq98q77b9Ijrzm2ucW0rzIgBCWF42EnzNx6WI",
                "resourceVersion": "18186",
                "uid": "9eb37232-5eda-4aa1-9bfe-aaeb95cf2f4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-operato-5yq98q77b9Ijrzm2ucW0rzIgBCWF42EnzNx6WI"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:39:11Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.15.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operator-controller-manager-service-system:auth-delegator",
                "resourceVersion": "18177",
                "uid": "12dedebb-61fc-4c7d-b998-e47f128cc9e6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:39:10Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-gitops-operator.v1.15.4",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "7TodAPaPk0LP0B3auCAWFJXqzxwHD6s6z4IB5m",
                    "operators.coreos.com/openshift-gitops-operator.openshift-operators": ""
                },
                "name": "openshift-gitops-operator-l8lwYPxActw8L0jc3vZqHq5fdyydGaKqEBwMY",
                "resourceVersion": "19380",
                "uid": "00a48793-601d-4442-a45b-5f4857955824"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-gitops-operator-l8lwYPxActw8L0jc3vZqHq5fdyydGaKqEBwMY"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-operator-controller-manager",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "imageregistry.operator.openshift.io/checksum": "sha256:9c18924fae4eab4651205fc268268a67bd4b9025164b242656ab8e009955b634"
                },
                "creationTimestamp": "2026-05-13T20:13:51Z",
                "name": "openshift-image-registry-pruner",
                "resourceVersion": "1727",
                "uid": "c0ba2aaa-4548-4ffb-8c22-433e1f040d59"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-pruner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pruner",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "Ingress",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:45Z",
                "name": "openshift-ingress-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1250",
                "uid": "9e6f48a8-2805-44e1-9b76-c9f6bcdd86ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ingress-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-operator",
                    "namespace": "openshift-ingress-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:53Z",
                "name": "openshift-ingress-router",
                "resourceVersion": "1975",
                "uid": "15ef7e06-94f4-408e-8909-b24d74472436"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ingress-router"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "router",
                    "namespace": "openshift-ingress"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:22Z",
                "name": "openshift-iptables-alerter",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "4103",
                "uid": "f87fd7e6-e09a-4207-97f4-83c6fdcecf91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-iptables-alerter"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "iptables-alerter",
                    "namespace": "openshift-network-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-minio-apply-tenants",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/openshift-minio-apply-tenants\"},\"name\":\"openshift-minio-apply-tenants\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"openshift-minio-apply-tenants\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"openshift-gitops-argocd-application-controller\",\"namespace\":\"openshift-gitops\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "openshift-minio-apply-tenants",
                "resourceVersion": "31314",
                "uid": "5a17638e-07dc-42d0-9391-877f592a6f67"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-minio-apply-tenants"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-gitops-argocd-application-controller",
                    "namespace": "openshift-gitops"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:13Z",
                "name": "openshift-ovn-kubernetes-control-plane-limited",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "3631",
                "uid": "8c6fe4da-e2b4-4399-ad9d-85b8c0c36a91"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ovn-kubernetes-control-plane-limited"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-control-plane",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:12Z",
                "name": "openshift-ovn-kubernetes-node-identity-limited",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "3417",
                "uid": "5825085d-7342-48cc-a46c-6b756fa06110"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ovn-kubernetes-node-limited"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:ovn-nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:14:12Z",
                "name": "openshift-ovn-kubernetes-node-kube-rbac-proxy",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.openshift.io/v1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "Network",
                        "name": "cluster",
                        "uid": "ab51d742-62a2-45dd-9837-0c050e153fc8"
                    }
                ],
                "resourceVersion": "3503",
                "uid": "57a507cf-96a4-4e1a-a66d-c02735e42f15"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-ovn-kubernetes-kube-rbac-proxy"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ovn-kubernetes-node",
                    "namespace": "openshift-ovn-kubernetes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:43:49Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v5.0.5-819",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "openshift-operators",
                    "olm.permissions.hash": "5hlYQdrS176uo0MeW95AXOMamc8AAzUSQfkTZH",
                    "operators.coreos.com/openshift-pipelines-operator-rh.openshift-operators": ""
                },
                "name": "openshift-pipelines-oper-8zgom50s4k9McPR215prxnAlTYznX2Nim17Bj1",
                "resourceVersion": "33747",
                "uid": "c9115351-b52d-4ab3-870c-f1464086d555"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-pipelines-oper-8zgom50s4k9McPR215prxnAlTYznX2Nim17Bj1"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-pipelines-operator",
                    "namespace": "openshift-operators"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "61f4edf517cbff5d27166eb44076b9072bc5c27b841ab2dd1f59a86f441dd6f6"
                },
                "creationTimestamp": "2026-05-13T20:44:47Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "openshift-pipelines-permission",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-r9jxm",
                        "uid": "80ecb1cb-4db4-4670-923a-309f926efebd"
                    }
                ],
                "resourceVersion": "34733",
                "uid": "1d440698-673c-45f0-bf71-108a723c9b99"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipelines-scc-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:27Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "openshift-state-metrics",
                "resourceVersion": "11481",
                "uid": "c19efbff-1680-4910-8493-446cc45b77bb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "openshift-state-metrics"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-state-metrics",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:21Z",
                "name": "osd-cluster-admin",
                "resourceVersion": "6444",
                "uid": "96606d54-b69b-46c0-8cfb-04bb0a0c2d61"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "cluster-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:17:02Z",
                "name": "osd-delete-backplane-script-resources",
                "resourceVersion": "5953",
                "uid": "4b2e376a-aea9-4705-9759-dddf58ca7753"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-delete-backplane-script-resources"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "osd-backplane",
                    "namespace": "openshift-backplane-managed-scripts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:43Z",
                "name": "osd-delete-backplane-serviceaccounts-c0",
                "resourceVersion": "5377",
                "uid": "73fb9f7a-c936-4207-9137-13106589840a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "osd-get-namespace"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:serviceaccount:openshift-backplane:osd-delete-backplane-serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:16:50Z",
                "name": "pcap-dedicated-admins",
                "resourceVersion": "5632",
                "uid": "c33cfaa6-fbd0-4219-9c2b-5c7f61316653"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pcap-dedicated-admins"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "dedicated-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:perf-team-prometheus-reader/perf-team-prometheus-reader-oomcrash-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:perf-team-prometheus-reader/perf-team-prometheus-reader-oomcrash-binding\"},\"name\":\"perf-team-prometheus-reader-oomcrash-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"perf-team-prometheus-reader-oomcrash-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"perf-team-prometheus-reader-oomcrash-sa\",\"namespace\":\"perf-team-prometheus-reader\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "perf-team-prometheus-reader-oomcrash-binding",
                "resourceVersion": "26474",
                "uid": "dc9e85cb-5653-4b41-b72c-ccae4a8b197b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "perf-team-prometheus-reader-oomcrash-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "perf-team-prometheus-reader-oomcrash-sa",
                    "namespace": "perf-team-prometheus-reader"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-exporter-reader-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-exporter-reader-binding\"},\"name\":\"pipeline-service-exporter-reader-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"pipeline-service-exporter-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipeline-service-exporter\",\"namespace\":\"openshift-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "pipeline-service-exporter-reader-binding",
                "resourceVersion": "31313",
                "uid": "18fbde07-467f-40fb-ba59-2026f490bb34"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-service-exporter-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline-service-exporter",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-exporter-resolution-req-read-until-ocp-at-415",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-exporter-resolution-req-read-until-ocp-at-415\"},\"name\":\"pipeline-service-exporter-resolution-req-read-until-ocp-at-415\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"pipeline-service-exporter-resolution-req-read-until-ocp-at-415\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"pipeline-service-exporter\",\"namespace\":\"openshift-pipelines\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "pipeline-service-exporter-resolution-req-read-until-ocp-at-415",
                "resourceVersion": "31312",
                "uid": "2e43330e-ce8d-4d64-a55e-3ecb225aacdf"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-service-exporter-resolution-req-read-until-ocp-at-415"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipeline-service-exporter",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-sre",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/pipeline-service-sre\"},\"name\":\"pipeline-service-sre\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"pipeline-service-sre\"},\"subjects\":[{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"Group\",\"name\":\"konflux-pipeline-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "pipeline-service-sre",
                "resourceVersion": "31316",
                "uid": "5e641a46-6c60-4aa1-89fe-2b6242a18578"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-service-sre"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "konflux-pipeline-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "1c390aaddd307fee3bee70fea9277cde89286b5813aa9b5ce50af5987e6f124f"
                },
                "creationTimestamp": "2026-05-13T20:46:28Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.46.0",
                    "operator.tekton.dev/operand-name": "openshift-pipeline-as-code"
                },
                "name": "pipelines-as-code-controller-clusterbinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-2sjff",
                        "uid": "b69ac242-d089-4727-9bd9-f2e2a702bf02"
                    }
                ],
                "resourceVersion": "38453",
                "uid": "f6b6e298-429f-4ad9-ad36-982a3f8cab74"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-as-code-controller-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "f45f09eba2e221bf51da8740b6e53fd7817a58b384f22964bd7c868a5dfddb69"
                },
                "creationTimestamp": "2026-05-13T20:46:29Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.46.0",
                    "operator.tekton.dev/operand-name": "openshift-pipeline-as-code"
                },
                "name": "pipelines-as-code-watcher-clusterbinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-2sjff",
                        "uid": "b69ac242-d089-4727-9bd9-f2e2a702bf02"
                    }
                ],
                "resourceVersion": "38461",
                "uid": "495a4510-87c2-483d-bdbd-2a8b182b37fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-as-code-watcher-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-watcher",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "753fbb819338ce08d93bdb0153206c2fce2f310710d8ecff85df262b68f777cd"
                },
                "creationTimestamp": "2026-05-13T20:46:29Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "pipelines-as-code",
                    "app.kubernetes.io/version": "v0.46.0",
                    "operator.tekton.dev/operand-name": "openshift-pipeline-as-code"
                },
                "name": "pipelines-as-code-webhook-clusterbinding",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "openshiftpipelinesascode-main-static-2sjff",
                        "uid": "b69ac242-d089-4727-9bd9-f2e2a702bf02"
                    }
                ],
                "resourceVersion": "38468",
                "uid": "2e77ce1a-652e-4f69-ab78-be3bc886f306"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "pipeline-as-code-webhook-clusterrole"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pipelines-as-code-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/component\":\"rbac\",\"app.kubernetes.io/created-by\":\"project-controller\",\"app.kubernetes.io/instance\":\"manager-rolebinding\",\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"clusterrolebinding\",\"app.kubernetes.io/part-of\":\"project-controller\"},\"name\":\"project-controller-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"project-controller-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"project-controller-controller-manager\",\"namespace\":\"project-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:27Z",
                "labels": {
                    "app.kubernetes.io/component": "rbac",
                    "app.kubernetes.io/created-by": "project-controller",
                    "app.kubernetes.io/instance": "manager-rolebinding",
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "clusterrolebinding",
                    "app.kubernetes.io/part-of": "project-controller"
                },
                "name": "project-controller-manager-rolebinding",
                "resourceVersion": "23211",
                "uid": "229bc1e1-708c-48aa-b8bc-eb1738aba3f3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "project-controller-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "project-controller-controller-manager",
                    "namespace": "project-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-metrics-auth-rolebinding\"},\"labels\":{\"app.kubernetes.io/component\":\"metrics-service\",\"app.kubernetes.io/created-by\":\"project-controller\",\"app.kubernetes.io/instance\":\"metrics-auth-rolebinding\",\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"clusterrolebinding\",\"app.kubernetes.io/part-of\":\"project-controller\"},\"name\":\"project-controller-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"project-controller-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"project-controller-controller-manager\",\"namespace\":\"project-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:27Z",
                "labels": {
                    "app.kubernetes.io/component": "metrics-service",
                    "app.kubernetes.io/created-by": "project-controller",
                    "app.kubernetes.io/instance": "metrics-auth-rolebinding",
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "clusterrolebinding",
                    "app.kubernetes.io/part-of": "project-controller"
                },
                "name": "project-controller-metrics-auth-rolebinding",
                "resourceVersion": "23214",
                "uid": "d5ad8485-75a9-4135-a5a6-5e7242a36e7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "project-controller-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "project-controller-controller-manager",
                    "namespace": "project-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-prometheus-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"project-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:project-controller/project-controller-prometheus-role-binding\"},\"name\":\"project-controller-prometheus-role-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"project-controller-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"project-controller-metrics-reader\",\"namespace\":\"project-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:27Z",
                "name": "project-controller-prometheus-role-binding",
                "resourceVersion": "23215",
                "uid": "54dafc67-555f-41df-810e-8089a6f9823e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "project-controller-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "project-controller-metrics-reader",
                    "namespace": "project-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/prometheus-build-service-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"build-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:build-service/prometheus-build-service-metrics-reader\"},\"name\":\"prometheus-build-service-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"build-service-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"build-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:40:59Z",
                "name": "prometheus-build-service-metrics-reader",
                "resourceVersion": "21085",
                "uid": "af67fee2-73b2-48a6-986e-b52c66f81982"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "build-service-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "build-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "monitoring-cardinality-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-cardinality-exporter/prometheus-cardinality-exporter",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"monitoring-cardinality-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-cardinality-exporter/prometheus-cardinality-exporter\"},\"labels\":{\"kubernetes.io/part-of\":\"appstudio-cardinality-exporter\"},\"name\":\"prometheus-cardinality-exporter\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"prometheus-cardinality-exporter-list\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-cardinality-exporter\",\"namespace\":\"appstudio-cardinality-exporter\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:02Z",
                "labels": {
                    "kubernetes.io/part-of": "appstudio-cardinality-exporter"
                },
                "name": "prometheus-cardinality-exporter",
                "resourceVersion": "21432",
                "uid": "c1151a0c-ec62-4dc4-9f6e-d26038ec2b0b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-cardinality-exporter-list"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-cardinality-exporter",
                    "namespace": "appstudio-cardinality-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "monitoring-cardinality-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-cardinality-exporter/prometheus-cardinality-exporter-monitoring-view",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"monitoring-cardinality-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-cardinality-exporter/prometheus-cardinality-exporter-monitoring-view\"},\"labels\":{\"kubernetes.io/part-of\":\"appstudio-cardinality-exporter\"},\"name\":\"prometheus-cardinality-exporter-monitoring-view\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"cluster-monitoring-view\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-cardinality-exporter\",\"namespace\":\"appstudio-cardinality-exporter\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:02Z",
                "labels": {
                    "kubernetes.io/part-of": "appstudio-cardinality-exporter"
                },
                "name": "prometheus-cardinality-exporter-monitoring-view",
                "resourceVersion": "21431",
                "uid": "4a3481a8-e604-4612-b5a8-247435c7eb23"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-cardinality-exporter",
                    "namespace": "appstudio-cardinality-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "dora-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:dora-metrics/prometheus-dora-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"dora-metrics-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:dora-metrics/prometheus-dora-metrics-reader\"},\"name\":\"prometheus-dora-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"dora-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"prometheus-k8s\",\"namespace\":\"dora-metrics\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:00Z",
                "name": "prometheus-dora-metrics-reader",
                "resourceVersion": "21216",
                "uid": "51a647cf-e657-4f71-b0c2-d187f5ba516b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "dora-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "dora-metrics"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/prometheus-image-controller-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"image-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:image-controller/prometheus-image-controller-metrics-reader\"},\"name\":\"prometheus-image-controller-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"image-controller-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"image-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:15Z",
                "name": "prometheus-image-controller-metrics-reader",
                "resourceVersion": "22544",
                "uid": "d69e944b-36b7-4ab6-90d3-87f5a389a937"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "image-controller-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "image-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:27Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "k8s",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-k8s",
                "resourceVersion": "11478",
                "uid": "9b01ed6f-ced2-4c93-883e-7c61039dee10"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-k8s"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/prometheus-kueue-external-admission-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/prometheus-kueue-external-admission-metrics-reader\"},\"name\":\"prometheus-kueue-external-admission-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"alert-mgr-kueue-admission-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"kueue-external-admission\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:45:43Z",
                "name": "prometheus-kueue-external-admission-metrics-reader",
                "resourceVersion": "36897",
                "uid": "6474749d-8522-422e-a8e3-793563e6b79e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "alert-mgr-kueue-admission-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "kueue-external-admission"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/prometheus-multi-platform-controller-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"multi-platform-controller-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:multi-platform-controller/prometheus-multi-platform-controller-metrics-reader\"},\"name\":\"prometheus-multi-platform-controller-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"multi-platform-controller-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"multi-platform-controller\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:47:25Z",
                "name": "prometheus-multi-platform-controller-metrics-reader",
                "resourceVersion": "39938",
                "uid": "139295f1-d0c5-4798-a9f0-0c1c390284eb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "multi-platform-controller-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "multi-platform-controller"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "monitoring-workload-prometheus-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-workload-monitoring/prometheus-o11y-dummy-service-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"monitoring-workload-prometheus-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-workload-monitoring/prometheus-o11y-dummy-service-metrics-reader\"},\"name\":\"prometheus-o11y-dummy-service-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"o11y-dummy-service-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"dummy-service\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "prometheus-o11y-dummy-service-metrics-reader",
                "resourceVersion": "26480",
                "uid": "56f9b7d2-8016-4b1e-9b61-dbaa9c341f6b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "o11y-dummy-service-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "dummy-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/prometheus-o11y-kubearchive-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"kubearchive-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive/prometheus-o11y-kubearchive-metrics-reader\"},\"name\":\"prometheus-o11y-kubearchive-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"o11y-kubearchive-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"product-kubearchive\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:08Z",
                "name": "prometheus-o11y-kubearchive-metrics-reader",
                "resourceVersion": "30804",
                "uid": "d1da813d-99d7-488c-826e-71f3e41f8ede"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "o11y-kubearchive-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "product-kubearchive"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:20Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "0.78.1"
                },
                "name": "prometheus-operator",
                "resourceVersion": "11079",
                "uid": "0c7da824-04fd-4be0-8a0c-a52729c98120"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-operator",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/prometheus-product-kubearchive-logging-metrics-reader",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/prometheus-product-kubearchive-logging-metrics-reader\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"name\":\"prometheus-product-kubearchive-logging-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"product-kubearchive-logging-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:42:23Z",
                "name": "prometheus-product-kubearchive-logging-metrics-reader",
                "resourceVersion": "28891",
                "uid": "cc37e428-e913-4baa-bc79-1bfc3e0dba85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "product-kubearchive-logging-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/prometheus-tekton-kueue-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/prometheus-tekton-kueue-metrics-reader\"},\"name\":\"prometheus-tekton-kueue-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-kueue-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"tekton-kueue\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:25Z",
                "name": "prometheus-tekton-kueue-metrics-reader",
                "resourceVersion": "31896",
                "uid": "cb9cd2f3-ca2e-4ca8-9469-e14d663995a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-kueue-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/prometheus-tekton-results-service-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/prometheus-tekton-results-service-metrics-reader\"},\"name\":\"prometheus-tekton-results-service-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-results-service-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"tekton-results\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "prometheus-tekton-results-service-metrics-reader",
                "resourceVersion": "31315",
                "uid": "ee39d7cc-5ef4-4121-96db-25c796831cfd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-service-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:41:50Z",
                "labels": {
                    "app.kubernetes.io/component": "prometheus",
                    "app.kubernetes.io/instance": "user-workload",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "2.55.1"
                },
                "name": "prometheus-user-workload",
                "resourceVersion": "25222",
                "uid": "2c413946-9412-4460-bdc9-dbd71de1d635"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-user-workload"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-user-workload",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:41:50Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "prometheus-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "0.78.1"
                },
                "name": "prometheus-user-workload-operator",
                "resourceVersion": "25205",
                "uid": "2a256446-f508-4de8-a6e5-705cd93c30e3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "prometheus-user-workload-operator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-operator",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/provider-kubernetes-edit",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/provider-kubernetes-edit\"},\"name\":\"provider-kubernetes-edit\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"edit\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"provider-kubernetes\",\"namespace\":\"crossplane-system\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:42:02Z",
                "name": "provider-kubernetes-edit",
                "resourceVersion": "27202",
                "uid": "7982b93a-d49e-4be7-9d09-108ba65d2c11"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "edit"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "provider-kubernetes",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/provider-kubernetes-extra",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"crossplane-control-plane-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:crossplane-system/provider-kubernetes-extra\"},\"name\":\"provider-kubernetes-extra\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"provider-kubernetes-extra\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"provider-kubernetes\",\"namespace\":\"crossplane-system\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:42:02Z",
                "name": "provider-kubernetes-extra",
                "resourceVersion": "27197",
                "uid": "d7a388ec-be13-4ba2-a865-b2f32e8e0a70"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "provider-kubernetes-extra"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "provider-kubernetes",
                    "namespace": "crossplane-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "monitoring-registry-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-registry-exporter/registry-exporter-role-binding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"monitoring-registry-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-registry-exporter/registry-exporter-role-binding\"},\"name\":\"registry-exporter-role-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kube-rbac-proxy-registry\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"exporter-sa\",\"namespace\":\"appstudio-registry-exporter\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:42:45Z",
                "name": "registry-exporter-role-binding",
                "resourceVersion": "29924",
                "uid": "82e7d476-98dd-4382-9d90-55533792dd85"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kube-rbac-proxy-registry"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "exporter-sa",
                    "namespace": "appstudio-registry-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "monitoring-registry-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-registry-exporter/registry-exporter-role-binding-metrics-reader",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"monitoring-registry-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:appstudio-registry-exporter/registry-exporter-role-binding-metrics-reader\"},\"name\":\"registry-exporter-role-binding-metrics-reader\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"registry-exporter-role-metrics-reader\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"metrics-reader\",\"namespace\":\"appstudio-registry-exporter\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:42:45Z",
                "name": "registry-exporter-role-binding-metrics-reader",
                "resourceVersion": "29923",
                "uid": "1e7f740e-9a9a-4e17-9f27-1cfaea5f357a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "registry-exporter-role-metrics-reader"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-reader",
                    "namespace": "appstudio-registry-exporter"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "capability.openshift.io/name": "ImageRegistry",
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:31Z",
                "name": "registry-monitoring",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "725",
                "uid": "2d81b791-0573-4b56-bb8d-22679ad7940c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "registry-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "imageregistry.operator.openshift.io/checksum": "sha256:74248883530fac21ef97d7c550c5f486050f236de11e2021e1f5961957eb75bc"
                },
                "creationTimestamp": "2026-05-13T20:13:52Z",
                "name": "registry-registry-role",
                "resourceVersion": "1829",
                "uid": "9891d43f-4ff7-48ed-a71b-49726a11c341"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:registry"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "registry",
                    "namespace": "openshift-image-registry"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-application-role-binding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-application-role-binding",
                "resourceVersion": "27504",
                "uid": "f3a034c2-3d79-4d3e-befb-dfb1b6487e27"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-application-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-component-role-binding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-component-role-binding",
                "resourceVersion": "27508",
                "uid": "7cd02289-77cf-41af-8f16-50d62cb4a47b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-component-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-environment-role-binding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-environment-role-binding",
                "resourceVersion": "27502",
                "uid": "b18488ca-ca39-4bf3-8b12-335ce949b326"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-environment-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-manager-rolebinding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-manager-rolebinding",
                "resourceVersion": "27513",
                "uid": "3975be4d-5fc0-4f5f-9dd9-2b2d2bbc48f4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-metrics-auth-rolebinding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-metrics-auth-rolebinding",
                "resourceVersion": "27498",
                "uid": "08129176-761e-459f-813f-18b70eb32a2d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-prometheus-role-binding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-prometheus-role-binding",
                "resourceVersion": "27499",
                "uid": "9ec23ec0-3f46-44bd-96d7-17ca83eeb2f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-prometheus-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-metrics-reader",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-release-role-binding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-release-role-binding",
                "resourceVersion": "27516",
                "uid": "fbd17802-d3f9-49a7-9324-7db1bb07b5d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-release-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-releaseplan-role-binding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-releaseplan-role-binding",
                "resourceVersion": "27514",
                "uid": "8f326c48-0dc0-45f3-b6b0-93b0dc282412"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-releaseplan-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-releaseplanadmission-role-binding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-releaseplanadmission-role-binding",
                "resourceVersion": "27503",
                "uid": "62f60bb2-0d6e-43c8-a16b-585c85ce15d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-releaseplanadmission-viewer-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-snapshot-role-binding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-snapshot-role-binding",
                "resourceVersion": "27512",
                "uid": "7d07d2c5-8735-4ecb-924a-ea06dd5c3a4b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-snapshot-editor-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-snapshotenvironmentbinding-role-binding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-snapshotenvironmentbinding-role-binding",
                "resourceVersion": "27515",
                "uid": "6e386209-69fd-41f3-b4e5-cd13f3a8a985"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-snapshotenvironmentbinding-editor-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "release-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:release-service/release-service-tekton-role-binding"
                },
                "creationTimestamp": "2026-05-13T20:42:04Z",
                "name": "release-service-tekton-role-binding",
                "resourceVersion": "27510",
                "uid": "57154c98-515a-4d6e-9513-8f0bdab281ef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "release-service-tekton-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "release-service-controller-manager",
                    "namespace": "release-service"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:54Z",
                "name": "router-monitoring",
                "resourceVersion": "2019",
                "uid": "7edb8906-4a9b-480a-9b0f-a0154a45ff40"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "router-monitoring"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "prometheus-k8s",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:perf-team-prometheus-reader/sa-read-permissions-openshift-monitoring",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"perf-team-prometheus-reader-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:perf-team-prometheus-reader/sa-read-permissions-openshift-monitoring\"},\"name\":\"sa-read-permissions-openshift-monitoring\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"cluster-monitoring-view\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"perf-team-prometheus-reader-cluster-sa\",\"namespace\":\"perf-team-prometheus-reader\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:41:58Z",
                "name": "sa-read-permissions-openshift-monitoring",
                "resourceVersion": "26466",
                "uid": "18b2c809-d5ff-473e-a161-77bc4e2af385"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "perf-team-prometheus-reader-cluster-sa",
                    "namespace": "perf-team-prometheus-reader"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "self-access-reviewers",
                "resourceVersion": "414",
                "uid": "f6920834-2396-42ea-97a5-48b09f0d15f7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "self-access-reviewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "self-provisioners",
                "resourceVersion": "415",
                "uid": "aef16723-edff-4fa8-a706-73d448b9c7f1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "self-provisioner"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated:oauth"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:23:52Z",
                "name": "storage-version-migration-migrator",
                "resourceVersion": "10078",
                "uid": "27fdfd3e-7b6f-4b47-85e0-95855867b836"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-storage-version-migrator-sa",
                    "namespace": "openshift-kube-storage-version-migrator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system-bootstrap-node-renewal",
                "resourceVersion": "1506",
                "uid": "755eba77-37eb-4671-8d1e-7b7250644db5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:certificates.k8s.io:certificatesigningrequests:selfnodeclient"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:basic-user",
                "resourceVersion": "212",
                "uid": "f08a42b5-0db4-43f6-8c78-e7058fe1a1b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:basic-user"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:build-strategy-docker-binding",
                "resourceVersion": "422",
                "uid": "dc0f9dc2-4cf2-4ca2-9b25-924a284f39be"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:build-strategy-docker"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:build-strategy-jenkinspipeline-binding",
                "resourceVersion": "425",
                "uid": "872d9afb-f794-400d-af7f-e3552f6f2d2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:build-strategy-jenkinspipeline"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:build-strategy-source-binding",
                "resourceVersion": "423",
                "uid": "8ae81a83-4ea5-468a-b721-0629b7e8b380"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:build-strategy-source"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:attachdetach-controller",
                "resourceVersion": "223",
                "uid": "0b1c4e4b-9ace-4c91-8ac7-72844e0f33ab"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:attachdetach-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "attachdetach-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:certificate-controller",
                "resourceVersion": "249",
                "uid": "f67898e8-41a5-416c-8b95-da655285dec2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:certificate-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "certificate-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:clusterrole-aggregation-controller",
                "resourceVersion": "224",
                "uid": "a414f4e0-91cc-44cf-ba51-7078c08ddaf7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:clusterrole-aggregation-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "clusterrole-aggregation-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:cronjob-controller",
                "resourceVersion": "225",
                "uid": "eb9865b6-7385-41f0-bae5-7f7f86465c4a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:cronjob-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cronjob-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:daemon-set-controller",
                "resourceVersion": "226",
                "uid": "abd49190-d5d4-47f0-aea3-b4aa0b3602d2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:daemon-set-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "daemon-set-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:deployment-controller",
                "resourceVersion": "227",
                "uid": "5089ab16-8ee6-4c1b-b2a3-bc7b35c6ec82"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:deployment-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployment-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:disruption-controller",
                "resourceVersion": "228",
                "uid": "487585e2-84fc-4c38-a941-3cc244f295e0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:disruption-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "disruption-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpoint-controller",
                "resourceVersion": "229",
                "uid": "1d086559-1264-4093-a8fa-99df4b44599b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpoint-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpoint-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpointslice-controller",
                "resourceVersion": "230",
                "uid": "5d941240-e644-4dae-8a53-b29ff01e4801"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpointslice-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpointslice-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:endpointslicemirroring-controller",
                "resourceVersion": "231",
                "uid": "acc545a4-2280-41e7-b610-9b2a47bed764"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:endpointslicemirroring-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "endpointslicemirroring-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ephemeral-volume-controller",
                "resourceVersion": "233",
                "uid": "fe60845b-edc7-44d3-a87d-c3e47ed56eac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ephemeral-volume-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ephemeral-volume-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:expand-controller",
                "resourceVersion": "232",
                "uid": "ffcbe2f7-9e68-49e0-bf10-09714eacd076"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:expand-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "expand-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:generic-garbage-collector",
                "resourceVersion": "234",
                "uid": "0d5076ea-9ba5-4b57-9574-81998f3c540d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:generic-garbage-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "generic-garbage-collector",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:horizontal-pod-autoscaler",
                "resourceVersion": "447",
                "uid": "6e9163ad-c8b4-4b5e-b5cf-4edba3895264"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:horizontal-pod-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "horizontal-pod-autoscaler",
                    "namespace": "kube-system"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "horizontal-pod-autoscaler",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:job-controller",
                "resourceVersion": "236",
                "uid": "a3e4d576-8ab8-46ae-850b-afbafabf4d9d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:job-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "job-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:legacy-service-account-token-cleaner",
                "resourceVersion": "256",
                "uid": "4e6140ec-128c-40c0-917b-790305b6a150"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:legacy-service-account-token-cleaner"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "legacy-service-account-token-cleaner",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:namespace-controller",
                "resourceVersion": "237",
                "uid": "3685ad07-0931-4e2b-b55e-32f2c4c215fb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:namespace-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:node-controller",
                "resourceVersion": "238",
                "uid": "2625cdb4-1ae9-47b9-a623-48d3c4b5e2dc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:node-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:persistent-volume-binder",
                "resourceVersion": "239",
                "uid": "809fa945-8d38-45b6-8045-49ae8a8a5f5a"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:persistent-volume-binder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "persistent-volume-binder",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pod-garbage-collector",
                "resourceVersion": "240",
                "uid": "3db71ea4-e8aa-434d-be2c-bcfd0692cfeb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pod-garbage-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pod-garbage-collector",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pv-protection-controller",
                "resourceVersion": "251",
                "uid": "3c8cae07-a5f6-4c2b-bb7c-13a4fd7e1bd1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pv-protection-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pv-protection-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:pvc-protection-controller",
                "resourceVersion": "250",
                "uid": "5d75cb02-8596-4c9b-ad8a-efb09d768166"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:pvc-protection-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pvc-protection-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:replicaset-controller",
                "resourceVersion": "241",
                "uid": "a8e3ad60-1fc7-4e3b-9451-2d1ddebbe588"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:replicaset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "replicaset-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:replication-controller",
                "resourceVersion": "242",
                "uid": "d5d30a64-680c-405f-a776-cbfda8f02201"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:replication-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "replication-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:resourcequota-controller",
                "resourceVersion": "243",
                "uid": "36772aab-4cdb-4e1d-b7c4-c1181afebe55"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:resourcequota-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "resourcequota-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:root-ca-cert-publisher",
                "resourceVersion": "253",
                "uid": "56eb4540-a2e2-47a5-b900-0efdc231abd6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:root-ca-cert-publisher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "root-ca-cert-publisher",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:route-controller",
                "resourceVersion": "244",
                "uid": "01b5af90-eeb1-43de-9fd2-cdeccf1844a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:route-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "route-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-account-controller",
                "resourceVersion": "245",
                "uid": "3cdb3c89-b9a0-452a-a9ac-48fcc0b4548e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-account-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-account-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-ca-cert-publisher",
                "resourceVersion": "254",
                "uid": "7dbac7fd-5e3b-45b9-85df-c0776d7f6e2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-ca-cert-publisher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca-cert-publisher",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:service-controller",
                "resourceVersion": "246",
                "uid": "6185824f-6eae-4b60-a4cf-40dc04d87707"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:service-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:statefulset-controller",
                "resourceVersion": "247",
                "uid": "f06717f2-0727-4c11-87e4-1be90623b31e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:statefulset-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "statefulset-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ttl-after-finished-controller",
                "resourceVersion": "252",
                "uid": "9da0042f-4f1b-48e9-aa49-43fa1a92639b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ttl-after-finished-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ttl-after-finished-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:ttl-controller",
                "resourceVersion": "248",
                "uid": "0bc992d5-dd64-4fad-a0d9-165d40a533b0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:ttl-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ttl-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:controller:validatingadmissionpolicy-status-controller",
                "resourceVersion": "255",
                "uid": "a9b4cbc8-d263-4167-8baf-a8e9b3be1260"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:controller:validatingadmissionpolicy-status-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "validatingadmissionpolicy-status-controller",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:deployer",
                "resourceVersion": "1547",
                "uid": "f58b0c26-6692-4e37-81d0-ce3221d00aa3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:deployer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:discovery",
                "resourceVersion": "211",
                "uid": "beff91ee-c55e-45c1-b4f9-326a9855eb76"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:image-builder",
                "resourceVersion": "451",
                "uid": "67c2cdb8-9f6a-4bea-82c6-681997fd6ae6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-builder"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:image-puller",
                "resourceVersion": "450",
                "uid": "a096e22f-523c-4c49-9fb5-9aac37ace6c1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:image-puller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-controller-manager",
                "resourceVersion": "216",
                "uid": "fd4495e5-d2af-4445-b563-be2214f58d6e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-controller-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-controller-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-dns",
                "resourceVersion": "217",
                "uid": "91e8231c-34db-457b-9a6d-748fcab724b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-dns"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-dns",
                    "namespace": "kube-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:kube-scheduler",
                "resourceVersion": "218",
                "uid": "cbd2ba89-5785-4d86-82f1-f7ad780d3d30"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:kube-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:masters",
                "resourceVersion": "409",
                "uid": "04ed9a37-690d-4f92-9ed8-84e48ad8cbd8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:master"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:masters"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:28Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "metrics-server",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "system:metrics-server",
                "resourceVersion": "11588",
                "uid": "6eddb360-836a-445c-8203-05de97d99260"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:metrics-server"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "metrics-server",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:monitoring",
                "resourceVersion": "210",
                "uid": "f3241f8d-c550-44a7-9396-26efbfaa6a38"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:monitoring"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node",
                "resourceVersion": "220",
                "uid": "c2328bab-2130-471b-9177-0f093a2b31cd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node"
            }
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node-admin",
                "resourceVersion": "222",
                "uid": "403b2b44-2b50-447a-9374-6300b357be98"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:master"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-apiserver"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:node-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:node-admins",
                "resourceVersion": "410",
                "uid": "cc871a72-9d83-4b71-957e-5660fbcba6a0"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-admin"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:master"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:node-admins"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:node-bootstrapper",
                "resourceVersion": "426",
                "uid": "d32be903-da22-4cbe-815e-f05a8985965f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-bootstrapper"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "node-bootstrapper",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:node-proxier",
                "resourceVersion": "215",
                "uid": "bb4c66c1-295b-4e2b-8eca-bd94a7688208"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-proxier"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-proxy"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:node-proxiers",
                "resourceVersion": "418",
                "uid": "2ebe316f-a512-44f2-82a6-db8dedd5cadc"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:node-proxier"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:oauth-token-deleters",
                "resourceVersion": "416",
                "uid": "140e79c1-993c-4227-9886-1e71aa411584"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:oauth-token-deleter"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:build-config-change-controller",
                "resourceVersion": "429",
                "uid": "f35e1850-c868-4d8c-826d-cfee9b2e0619"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:build-config-change-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-config-change-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:build-controller",
                "resourceVersion": "428",
                "uid": "17e911d0-422d-49a9-b98b-38edbffc4d8c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:build-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "build-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:cluster-csr-approver-controller",
                "resourceVersion": "1498",
                "uid": "cdb9d505-7337-433a-ac22-be0ccd82c6b9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:cluster-csr-approver-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-csr-approver-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:cluster-quota-reconciliation-controller",
                "resourceVersion": "441",
                "uid": "3fb01eff-f8ae-4ba1-a663-2e78a61f0bef"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:cluster-quota-reconciliation-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cluster-quota-reconciliation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:default-rolebindings-controller",
                "resourceVersion": "452",
                "uid": "29328c84-8285-45ab-a19e-35d28f456f09"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:default-rolebindings-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "default-rolebindings-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:deployer-controller",
                "resourceVersion": "430",
                "uid": "bfaa106d-22ea-49af-a26c-b48c3679b976"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:deployer-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deployer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:deploymentconfig-controller",
                "resourceVersion": "431",
                "uid": "7f4a4469-e988-4b44-93b5-234ddbe2689f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:deploymentconfig-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "deploymentconfig-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:horizontal-pod-autoscaler",
                "resourceVersion": "446",
                "uid": "87d946ba-e457-42f7-9159-644732275fc2"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:horizontal-pod-autoscaler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "horizontal-pod-autoscaler",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:image-import-controller",
                "resourceVersion": "440",
                "uid": "f7d16b7f-1989-4e6b-a1a4-cda9b1562820"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:image-import-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-import-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:image-trigger-controller",
                "resourceVersion": "439",
                "uid": "e987e4a0-ef2b-4144-8472-8c232f834f5e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:image-trigger-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-trigger-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:39Z",
                "name": "system:openshift:controller:machine-approver",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1086",
                "uid": "830231b4-5cfd-4cc4-9af5-982da837bc0f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:machine-approver"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "machine-approver-sa",
                    "namespace": "openshift-cluster-machine-approver"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:namespace-security-allocation-controller",
                "resourceVersion": "1502",
                "uid": "499f920b-d55f-4595-b7eb-0613b9eef681"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:namespace-security-allocation-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "namespace-security-allocation-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:origin-namespace-controller",
                "resourceVersion": "436",
                "uid": "e6758eb3-3cc1-4ff3-82ac-908e3798f1fe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:origin-namespace-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "origin-namespace-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:podsecurity-admission-label-syncer-controller",
                "resourceVersion": "1542",
                "uid": "689e6bfa-50d0-459f-aa33-53389e053d8b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:podsecurity-admission-label-syncer-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "podsecurity-admission-label-syncer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:controller:privileged-namespaces-psa-label-syncer",
                "resourceVersion": "1544",
                "uid": "3669c08d-4700-4b08-91fd-4de9e0ece740"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:privileged-namespaces-psa-label-syncer"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "privileged-namespaces-psa-label-syncer",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:pv-recycler-controller",
                "resourceVersion": "444",
                "uid": "a307a714-9809-4f66-9751-79572b26a736"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:pv-recycler-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "pv-recycler-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:resourcequota-controller",
                "resourceVersion": "445",
                "uid": "93a505f0-626f-4852-a73c-91e33466e805"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:resourcequota-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "resourcequota-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:23:53Z",
                "name": "system:openshift:controller:service-ca",
                "resourceVersion": "10153",
                "uid": "66e1cd05-3889-493a-a820-17b2cf86626d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:service-ca"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca",
                    "namespace": "openshift-service-ca"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:service-ingress-ip-controller",
                "resourceVersion": "443",
                "uid": "3f21984e-9851-4ce8-8d7d-e4a5949ac096"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:service-ingress-ip-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ingress-ip-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:serviceaccount-controller",
                "resourceVersion": "437",
                "uid": "4e4b4c61-92f6-4604-8b98-68a99daa50d8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:serviceaccount-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "serviceaccount-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:serviceaccount-pull-secrets-controller",
                "resourceVersion": "438",
                "uid": "983522c6-de5b-4221-a40c-b4c5f90ef000"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:serviceaccount-pull-secrets-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "serviceaccount-pull-secrets-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:template-instance-controller",
                "resourceVersion": "432",
                "uid": "ae4c7b1f-16a0-4978-b642-d1a4166d5837"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:template-instance-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:template-instance-controller:admin",
                "resourceVersion": "433",
                "uid": "dbcbe341-1a35-40f4-8ce0-dd2806629ea8"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:template-instance-finalizer-controller",
                "resourceVersion": "434",
                "uid": "1661475a-52a4-4081-8f35-66001e7de16c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:template-instance-finalizer-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-finalizer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:template-instance-finalizer-controller:admin",
                "resourceVersion": "435",
                "uid": "f72d6066-a7e3-467e-bb74-24e3e9f280ec"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-instance-finalizer-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:template-service-broker",
                "resourceVersion": "448",
                "uid": "f27ea19e-2b4b-401e-bf64-847f18222903"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:template-service-broker"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "template-service-broker",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:controller:unidling-controller",
                "resourceVersion": "442",
                "uid": "08f3457a-a0e4-4349-9362-613539b5f421"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:controller:unidling-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "unidling-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:openshift:discovery",
                "resourceVersion": "421",
                "uid": "7fd1a5e6-520c-41da-8e48-bf185f9c0512"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:openshift-controller-manager:image-trigger-controller",
                "resourceVersion": "1540",
                "uid": "c901073e-ec7c-4081-8fa4-652a1351fa7f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:openshift-controller-manager:image-trigger-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "image-trigger-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:openshift-controller-manager:ingress-to-route-controller",
                "resourceVersion": "1501",
                "uid": "ddcb7e33-8952-46a6-a3a3-a31a35dcbfc5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:openshift-controller-manager:ingress-to-route-controller"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "ingress-to-route-controller",
                    "namespace": "openshift-infra"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:38Z",
                "name": "system:openshift:operator:authentication",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1012",
                "uid": "8d84cab5-e06e-4e26-b2ea-5c5911c822b6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "authentication-operator",
                    "namespace": "openshift-authentication-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:35Z",
                "name": "system:openshift:operator:cluster-kube-scheduler-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "937",
                "uid": "47df54cb-6d71-404b-b0e3-1944120e7877"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-kube-scheduler-operator",
                    "namespace": "openshift-kube-scheduler-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:51Z",
                "name": "system:openshift:operator:kube-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1799",
                "uid": "6e3fb6a1-d9df-45ef-a5f4-67f987e3c939"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-apiserver-operator",
                    "namespace": "openshift-kube-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:38Z",
                "name": "system:openshift:operator:kube-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1021",
                "uid": "1737d2d9-a80c-45bb-bdd1-e933e9b65fbb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-controller-manager-operator",
                    "namespace": "openshift-kube-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:38Z",
                "name": "system:openshift:operator:kube-storage-version-migrator-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1054",
                "uid": "86a748c0-bce7-4ece-a5e6-aa07b896f711"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "kube-storage-version-migrator-operator",
                    "namespace": "openshift-kube-storage-version-migrator-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:37Z",
                "name": "system:openshift:operator:openshift-apiserver-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "992",
                "uid": "2d57179c-dc2f-46c9-9378-9371e51487ad"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-apiserver-operator",
                    "namespace": "openshift-apiserver-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:52Z",
                "name": "system:openshift:operator:openshift-config-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1860",
                "uid": "fb4cfaa0-c341-492b-ad80-c57cfa8a8660"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-config-operator",
                    "namespace": "openshift-config-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:37Z",
                "name": "system:openshift:operator:openshift-controller-manager-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "994",
                "uid": "dc8d7519-5681-4c3e-9132-053911879b77"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "openshift-controller-manager-operator",
                    "namespace": "openshift-controller-manager-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/hypershift": "true",
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:30Z",
                "name": "system:openshift:operator:service-ca-operator",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "668",
                "uid": "5f90138e-7755-4a04-a8b7-d0cf76020d7e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "service-ca-operator",
                    "namespace": "openshift-service-ca-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:openshift:public-info-viewer",
                "resourceVersion": "214",
                "uid": "22292f4e-046b-40f6-8202-4c50ee9b8247"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:public-info-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:unauthenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "include.release.openshift.io/ibm-cloud-managed": "true",
                    "include.release.openshift.io/self-managed-high-availability": "true",
                    "include.release.openshift.io/single-node-developer": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:43Z",
                "name": "system:openshift:scc:restricted-v2",
                "ownerReferences": [
                    {
                        "apiVersion": "config.openshift.io/v1",
                        "controller": true,
                        "kind": "ClusterVersion",
                        "name": "version",
                        "uid": "4bc75ef5-f28e-4881-946c-00a99d2b43ac"
                    }
                ],
                "resourceVersion": "1171",
                "uid": "a67e77ec-758c-483c-8870-fd7d00d14529"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:scc:restricted-v2"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:49Z",
                "labels": {
                    "hypershift.openshift.io/managed": "true"
                },
                "name": "system:openshift:useroauthaccesstoken-manager",
                "resourceVersion": "1549",
                "uid": "b1b19a6a-2191-435e-920b-c5eba4c4ccdb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:openshift:useroauthaccesstoken-manager"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated:oauth"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:public-info-viewer",
                "resourceVersion": "213",
                "uid": "e560bb4d-7c27-42d6-b545-7ae8e3495fda"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:public-info-viewer"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                },
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:unauthenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:scope-impersonation",
                "resourceVersion": "427",
                "uid": "64f9282c-dcb6-47d1-b263-de72c3632ef3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:scope-impersonation"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:sdn-readers",
                "resourceVersion": "419",
                "uid": "e276c1c4-9bdd-47a4-8238-335dea12cfba"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:sdn-reader"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:nodes"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:service-account-issuer-discovery",
                "resourceVersion": "221",
                "uid": "fdb75261-17a9-48bf-8405-f6847a2763c3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:service-account-issuer-discovery"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:serviceaccounts"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:12:57Z",
                "labels": {
                    "kubernetes.io/bootstrapping": "rbac-defaults"
                },
                "name": "system:volume-scheduler",
                "resourceVersion": "219",
                "uid": "01b57d51-48ed-441f-8e63-bbbbcaf7b101"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:volume-scheduler"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "User",
                    "name": "system:kube-scheduler"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "rbac.authorization.kubernetes.io/autoupdate": "true"
                },
                "creationTimestamp": "2026-05-13T20:13:06Z",
                "name": "system:webhooks",
                "resourceVersion": "420",
                "uid": "58ab6d72-990d-41e7-9c11-6783a416f749"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:webhook"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "6c71b37d861706202ecd28e0da2c64fcd20033254c5a8ef98446e53c402ed0cf"
                },
                "creationTimestamp": "2026-05-13T20:45:46Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains",
                    "operator.tekton.dev/operand-name": "tektoncd-chains"
                },
                "name": "tekton-chains-controller-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-rqr58",
                        "uid": "366a3304-8726-457e-b841-1e8bdf69ed97"
                    }
                ],
                "resourceVersion": "37157",
                "uid": "1eeb2efa-3369-4ce7-a92d-2937dd55178f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "56d9a9db847a28c74a172d03e03ce2d2448d7f0f1c761e9058b0331d246f485b"
                },
                "creationTimestamp": "2026-05-13T20:45:46Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-chains",
                    "operator.tekton.dev/operand-name": "tektoncd-chains"
                },
                "name": "tekton-chains-controller-tenant-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "chain-rqr58",
                        "uid": "366a3304-8726-457e-b841-1e8bdf69ed97"
                    }
                ],
                "resourceVersion": "37158",
                "uid": "714aa923-fdd4-4f42-a917-5d1bcdfcbd20"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-chains-controller-tenant-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-chains-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "85cb88b6420e497aeff0e6ab7f15b48fbae3fb77111408312c013525e602238f"
                },
                "creationTimestamp": "2026-05-13T20:44:47Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-clustertasks-view-rolebinding-all-users",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-r9jxm",
                        "uid": "80ecb1cb-4db4-4670-923a-309f926efebd"
                    }
                ],
                "resourceVersion": "34735",
                "uid": "4c2830b7-b933-4841-aefb-6797b4d86fa7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-clustertasks-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "beaaf08e68cfc793b08a21ceb2fa0dc5c60ee6eb50c1f0108eeb2bde65a65180"
                },
                "creationTimestamp": "2026-05-13T20:45:31Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-clustertriggerbindings-view-rolebinding-all-users",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-dpr4j",
                        "uid": "3ac14e9d-3c63-4b50-a5d0-64840ee3c5ae"
                    }
                ],
                "resourceVersion": "36376",
                "uid": "1502bf6c-a540-4891-a92f-1b684a73478c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-clustertriggerbindings-view-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:43:47Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v5.0.5-819"
                },
                "name": "tekton-config-read-rolebinding",
                "resourceVersion": "33010",
                "uid": "721ed6e3-4613-44d6-9783-24442bd578da"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-config-read-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "8552d6d8413ecacd6831a87532b219237f74687a35ff573634284aa14f05a85a"
                },
                "creationTimestamp": "2026-05-13T20:44:45Z",
                "labels": {
                    "app.kubernetes.io/component": "events",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-events-controller-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-r9jxm",
                        "uid": "80ecb1cb-4db4-4670-923a-309f926efebd"
                    }
                ],
                "resourceVersion": "34638",
                "uid": "85fc65b7-016d-4d53-983c-cb5f8b9be46e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-events-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-events-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-manager-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-manager-rolebinding\"},\"labels\":{\"app.kubernetes.io/managed-by\":\"kustomize\",\"app.kubernetes.io/name\":\"tekton-kueue\"},\"name\":\"tekton-kueue-manager-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-kueue-manager-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-kueue-controller-manager\",\"namespace\":\"tekton-kueue\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:45:43Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "kustomize",
                    "app.kubernetes.io/name": "tekton-kueue"
                },
                "name": "tekton-kueue-manager-rolebinding",
                "resourceVersion": "36895",
                "uid": "130eed95-45fc-4c48-8a46-3b8ae3577adb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-kueue-manager-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-kueue-controller-manager",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-metrics-auth-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-metrics-auth-rolebinding\"},\"name\":\"tekton-kueue-metrics-auth-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-kueue-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-kueue-controller-manager\",\"namespace\":\"tekton-kueue\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:45:43Z",
                "name": "tekton-kueue-metrics-auth-rolebinding",
                "resourceVersion": "36896",
                "uid": "904cf8c0-6563-47a8-bee0-d72518e7f89f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-kueue-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-kueue-controller-manager",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "10",
                    "argocd.argoproj.io/tracking-id": "kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-metrics-auth-webhook-rolebinding",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"10\",\"argocd.argoproj.io/tracking-id\":\"kueue-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:/tekton-kueue-metrics-auth-webhook-rolebinding\"},\"name\":\"tekton-kueue-metrics-auth-webhook-rolebinding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-kueue-metrics-auth-role\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-kueue-webhook\",\"namespace\":\"tekton-kueue\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:45:43Z",
                "name": "tekton-kueue-metrics-auth-webhook-rolebinding",
                "resourceVersion": "36899",
                "uid": "5079aee1-8b79-4036-9673-da685b4b4619"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-kueue-metrics-auth-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-kueue-webhook",
                    "namespace": "tekton-kueue"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:43:44Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v5.0.5-819"
                },
                "name": "tekton-multicluster-proxy-aae-rolebinding",
                "resourceVersion": "32727",
                "uid": "6312804d-32a8-453e-8939-fd71c8c25e6f"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-multicluster-proxy-aae-role"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operator",
                    "namespace": "tekton-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "5f33d06bd548c5e1f4fdff066ef681c3368f6420558b5ed3491d3e692623536e"
                },
                "creationTimestamp": "2026-05-13T20:44:47Z",
                "labels": {
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-operators-proxy-webhook-admin",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-r9jxm",
                        "uid": "80ecb1cb-4db4-4670-923a-309f926efebd"
                    }
                ],
                "resourceVersion": "34743",
                "uid": "8debb723-e623-48c8-84e3-53639add3563"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-operators-proxy-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-operators-proxy-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "c5e410e49e8e11a5eb596be099eb49ea15f319eeab16f4b9dc3f58fbaf2909c3"
                },
                "creationTimestamp": "2026-05-13T20:44:44Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-controller-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-r9jxm",
                        "uid": "80ecb1cb-4db4-4670-923a-309f926efebd"
                    }
                ],
                "resourceVersion": "34623",
                "uid": "6b0f8fa0-41a0-48b3-9e89-df1874984050"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-controller-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "1b6c0d625f0f8c682ac559458b3ce30c88a0c60094def3d57e25bc281513b2ef"
                },
                "creationTimestamp": "2026-05-13T20:44:44Z",
                "labels": {
                    "app.kubernetes.io/component": "controller",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-controller-tenant-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-r9jxm",
                        "uid": "80ecb1cb-4db4-4670-923a-309f926efebd"
                    }
                ],
                "resourceVersion": "34635",
                "uid": "86431c28-16b4-4a0d-828e-4e262246d3a5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-controller-tenant-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "f9a430936555489a00a22ad645b8e21eddeb8f7e0a66f575bb95166f8cb548f0"
                },
                "creationTimestamp": "2026-05-13T20:44:46Z",
                "labels": {
                    "app.kubernetes.io/component": "resolvers",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-resolvers",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-r9jxm",
                        "uid": "80ecb1cb-4db4-4670-923a-309f926efebd"
                    }
                ],
                "resourceVersion": "34700",
                "uid": "df3cfeea-f712-4b26-af62-47b317db9851"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-resolvers-resolution-request-updates"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-resolvers",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "05097cfb78da08cf93f2a81502981d0d327309299dc4f3cd7e3e61c1d4f1a5d4"
                },
                "creationTimestamp": "2026-05-13T20:44:44Z",
                "labels": {
                    "app.kubernetes.io/component": "webhook",
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-pipelines",
                    "operator.tekton.dev/operand-name": "tektoncd-pipelines"
                },
                "name": "tekton-pipelines-webhook-cluster-access",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "pipeline-main-static-r9jxm",
                        "uid": "80ecb1cb-4db4-4670-923a-309f926efebd"
                    }
                ],
                "resourceVersion": "34637",
                "uid": "0fc119c7-d2d9-4629-bd0f-f468b3ff92f6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-pipelines-webhook-cluster-access"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-pipelines-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:43:45Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "openshift-pipelines-operator-rh.v5.0.5-819"
                },
                "name": "tekton-result-read-rolebinding",
                "resourceVersion": "32823",
                "uid": "e17e984a-1090-487e-9370-c8615aab4101"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-result-read-role"
            },
            "subjects": [
                {
                    "apiGroup": "rbac.authorization.k8s.io",
                    "kind": "Group",
                    "name": "system:authenticated"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-api",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-api\"},\"labels\":{\"app.kubernetes.io/part-of\":\"tekton-results\",\"app.kubernetes.io/version\":\"devel\"},\"name\":\"tekton-results-api\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-results-api\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-results-api\",\"namespace\":\"tekton-results\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "labels": {
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "devel"
                },
                "name": "tekton-results-api",
                "resourceVersion": "31319",
                "uid": "867fac39-7ef4-4f5c-9c6c-ea7834f65637"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-api"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-results-api",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher\"},\"labels\":{\"app.kubernetes.io/part-of\":\"tekton-results\",\"app.kubernetes.io/version\":\"devel\"},\"name\":\"tekton-results-watcher\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-results-watcher\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-results-watcher\",\"namespace\":\"tekton-results\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "labels": {
                    "app.kubernetes.io/part-of": "tekton-results",
                    "app.kubernetes.io/version": "devel"
                },
                "name": "tekton-results-watcher",
                "resourceVersion": "31318",
                "uid": "3b7f563a-eae8-494d-b5b2-b678c1c3a345"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-watcher"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-results-watcher",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher-logs",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher-logs\"},\"name\":\"tekton-results-watcher-logs\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-results-admin\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-results-watcher\",\"namespace\":\"tekton-results\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "tekton-results-watcher-logs",
                "resourceVersion": "31320",
                "uid": "972c7585-645d-4c57-9d28-2a39a0e9d028"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-results-watcher",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-options": "SkipDryRunOnMissingResource=true",
                    "argocd.argoproj.io/sync-wave": "0",
                    "argocd.argoproj.io/tracking-id": "pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher-rbac",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-options\":\"SkipDryRunOnMissingResource=true\",\"argocd.argoproj.io/sync-wave\":\"0\",\"argocd.argoproj.io/tracking-id\":\"pipeline-service-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:openshift-pipelines/tekton-results-watcher-rbac\"},\"name\":\"tekton-results-watcher-rbac\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"tekton-results-watcher-rbac\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"tekton-results-watcher\",\"namespace\":\"tekton-results\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:43:15Z",
                "name": "tekton-results-watcher-rbac",
                "resourceVersion": "31321",
                "uid": "283d221b-ef51-4c3a-b071-4a382bab5cd5"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-results-watcher-rbac"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-results-watcher",
                    "namespace": "tekton-results"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "8c9b1c500535aaa6c1f455c952006a569229b1a7f94c391395692869489eec8e"
                },
                "creationTimestamp": "2026-05-13T20:45:30Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-controller-admin",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-dpr4j",
                        "uid": "3ac14e9d-3c63-4b50-a5d0-64840ee3c5ae"
                    }
                ],
                "resourceVersion": "36342",
                "uid": "2917837f-1253-4592-8829-df915f8ee0ff"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-controller",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "6bbd7b00ea8a7438bdfb3338cb8e485f7da8051ddcb23a197acf018939045257"
                },
                "creationTimestamp": "2026-05-13T20:45:30Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-core-interceptors",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-dpr4j",
                        "uid": "3ac14e9d-3c63-4b50-a5d0-64840ee3c5ae"
                    }
                ],
                "resourceVersion": "36354",
                "uid": "7b49323c-02f5-488e-9c93-3d693b1321fd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-core-interceptors"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "55628514cfafd4e7d0acd7eff8044eca99b31b52b70a041aec15004d8776c616"
                },
                "creationTimestamp": "2026-05-13T20:45:30Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-core-interceptors-secrets",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-dpr4j",
                        "uid": "3ac14e9d-3c63-4b50-a5d0-64840ee3c5ae"
                    }
                ],
                "resourceVersion": "36355",
                "uid": "5fdb7fe2-5c8e-47d5-87e7-4d5557588b3d"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-core-interceptors-secrets"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-core-interceptors",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "operator.tekton.dev/last-applied-hash": "b1f42128ec292e7c8181d6a3ca179f960c19aa4387a671b70ed3de1c42c0d9e1"
                },
                "creationTimestamp": "2026-05-13T20:45:30Z",
                "labels": {
                    "app.kubernetes.io/instance": "default",
                    "app.kubernetes.io/part-of": "tekton-triggers",
                    "operator.tekton.dev/operand-name": "tektoncd-triggers"
                },
                "name": "tekton-triggers-webhook-admin",
                "ownerReferences": [
                    {
                        "apiVersion": "operator.tekton.dev/v1alpha1",
                        "blockOwnerDeletion": true,
                        "controller": true,
                        "kind": "TektonInstallerSet",
                        "name": "trigger-main-static-dpr4j",
                        "uid": "3ac14e9d-3c63-4b50-a5d0-64840ee3c5ae"
                    }
                ],
                "resourceVersion": "36346",
                "uid": "803adee1-26ac-4e36-a88a-4c111d7004a6"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-admin"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tekton-triggers-webhook",
                    "namespace": "openshift-pipelines"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:27Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "telemeter-client",
                "resourceVersion": "11482",
                "uid": "dbda9766-fbc2-4c25-8384-5a386a48044e"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "telemeter-client"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "telemeter-client",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:25:47Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "telemeter-client-view",
                "resourceVersion": "13640",
                "uid": "a310c2b0-ac62-4528-8f08-789e99207efd"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "telemeter-client",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:29Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "tempo-operator.v0.20.0-3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tempo-operator",
                    "operators.coreos.com/tempo-product.tempo-operator": ""
                },
                "name": "tempo-operator-controller-service-system:auth-delegator",
                "resourceVersion": "29239",
                "uid": "c3f7b900-9c77-4076-bde7-f94e8254dfac"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "system:auth-delegator"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:27Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "operator-lifecycle-manager",
                    "app.kubernetes.io/name": "tempo-operator",
                    "app.kubernetes.io/part-of": "tempo-operator",
                    "olm.managed": "true",
                    "olm.owner": "tempo-operator.v0.20.0-3"
                },
                "name": "tempo-operator-manager-rolebinding-cluster-monitoring-view",
                "resourceVersion": "29313",
                "uid": "302517e6-65fe-495e-b4ee-b097500d42d3"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator-system"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:29Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "tempo-operator.v0.20.0-3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tempo-operator",
                    "olm.permissions.hash": "aRJgoPee7Jp0Wrp5NO0SdVNCmNfPOInjqtOg79",
                    "operators.coreos.com/tempo-product.tempo-operator": ""
                },
                "name": "tempo-operator.v0.20.0-3-90meOMbVKfW64WsEv1Vf3b5w7LY2M7UmCnq9HZ",
                "resourceVersion": "29227",
                "uid": "ec646811-a25e-4081-a185-a3f4a443c8ee"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tempo-operator.v0.20.0-3-90meOMbVKfW64WsEv1Vf3b5w7LY2M7UmCnq9HZ"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:42:29Z",
                "labels": {
                    "olm.managed": "true",
                    "olm.owner": "tempo-operator.v0.20.0-3",
                    "olm.owner.kind": "ClusterServiceVersion",
                    "olm.owner.namespace": "tempo-operator",
                    "olm.permissions.hash": "63DQMnougpWkpxpLsyHsgGOxChX9Oh9duRI6UW",
                    "operators.coreos.com/tempo-product.tempo-operator": ""
                },
                "name": "tempo-operator.v0.20.0-3-VHnQmLuTkmE4kuXPmUHVGQdFkBTxSOufvK2Rr",
                "resourceVersion": "29528",
                "uid": "e04969cd-62c6-406b-a614-dbb87a4f78a1"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tempo-operator.v0.20.0-3-VHnQmLuTkmE4kuXPmUHVGQdFkBTxSOufvK2Rr"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "tempo-operator-controller-manager",
                    "namespace": "tempo-operator"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:24:28Z",
                "labels": {
                    "app.kubernetes.io/component": "query-layer",
                    "app.kubernetes.io/instance": "thanos-querier",
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/name": "thanos-query",
                    "app.kubernetes.io/part-of": "openshift-monitoring",
                    "app.kubernetes.io/version": "0.36.1"
                },
                "name": "thanos-querier",
                "resourceVersion": "11689",
                "uid": "54fe09ab-5416-479f-b967-928d3897afbe"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "thanos-querier"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "thanos-querier",
                    "namespace": "openshift-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:41:51Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "thanos-ruler",
                "resourceVersion": "25342",
                "uid": "e515f2f7-fc43-44c5-8000-4ee576a3ccdb"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "thanos-ruler"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "thanos-ruler",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "creationTimestamp": "2026-05-13T20:41:51Z",
                "labels": {
                    "app.kubernetes.io/managed-by": "cluster-monitoring-operator",
                    "app.kubernetes.io/part-of": "openshift-monitoring"
                },
                "name": "thanos-ruler-monitoring",
                "resourceVersion": "25345",
                "uid": "76824525-d738-4efb-9306-11f953bd2a2b"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "cluster-monitoring-view"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "thanos-ruler",
                    "namespace": "openshift-user-workload-monitoring"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "disaster-recovery-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:konflux-disaster-recovery/triggers-cron-eventlistener-binding-cr"
                },
                "creationTimestamp": "2026-05-13T20:47:09Z",
                "name": "triggers-cron-eventlistener-binding-cr",
                "resourceVersion": "39494",
                "uid": "179b60d7-5252-4f1f-b474-7dcc9fb1f272"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "tekton-triggers-eventlistener-clusterroles"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "cron-trigger",
                    "namespace": "konflux-disaster-recovery"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "trust-manager-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/trust-manager",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"trust-manager-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:cert-manager/trust-manager\"},\"labels\":{\"app.kubernetes.io/instance\":\"trust-manager\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"trust-manager\",\"app.kubernetes.io/version\":\"v0.19.0\",\"helm.sh/chart\":\"trust-manager-v0.19.0\"},\"name\":\"trust-manager\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"trust-manager\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"trust-manager\",\"namespace\":\"cert-manager\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:42:24Z",
                "labels": {
                    "app.kubernetes.io/instance": "trust-manager",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "trust-manager",
                    "app.kubernetes.io/version": "v0.19.0",
                    "helm.sh/chart": "trust-manager-v0.19.0"
                },
                "name": "trust-manager",
                "resourceVersion": "28986",
                "uid": "8b03555e-b0ab-48fb-96ea-b444266762d9"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "trust-manager"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "trust-manager",
                    "namespace": "cert-manager"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"labels\":{\"app.kubernetes.io/component\":\"Agent\",\"app.kubernetes.io/instance\":\"vector\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"vector\",\"app.kubernetes.io/version\":\"0.54.0-distroless-libc\",\"helm.sh/chart\":\"vector-0.51.0\"},\"name\":\"vector\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"vector\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"vector\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:47:26Z",
                "labels": {
                    "app.kubernetes.io/component": "Agent",
                    "app.kubernetes.io/instance": "vector",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "vector",
                    "app.kubernetes.io/version": "0.54.0-distroless-libc",
                    "helm.sh/chart": "vector-0.51.0"
                },
                "name": "vector",
                "resourceVersion": "39964",
                "uid": "788de8ae-0c80-434f-8306-873b711c13c4"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "vector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "vector",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector-scc-binding",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector-scc-binding\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"name\":\"vector-scc-binding\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kubearchive-vector-scc-user\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"vector\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"loki\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"loki-sa\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"grafana\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"loki\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"loki-canary\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:42:23Z",
                "name": "vector-scc-binding",
                "resourceVersion": "28898",
                "uid": "80b4776e-552c-41bb-b23d-0351f050e85c"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-vector-scc-user"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "vector",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "loki",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "loki-sa",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "grafana",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "loki",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "loki-canary",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector-scc-binding-dev-extras",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/no-read-only-root-fs": "\"Minio post-jobs from chart require write access to filesystem.\"\n",
                    "ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy": "\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector runs requires certain host mounts to watch files being created by pods.\"\n",
                    "ignore-check.kube-linter.io/unset-cpu-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "ignore-check.kube-linter.io/unset-memory-requirements": "\"Minio post-job containers from chart do not expose resource configuration options.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"vector-kubearchive-log-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:product-kubearchive-logging/vector-scc-binding-dev-extras\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/no-read-only-root-fs\":\"\\\"Minio post-jobs from chart require write access to filesystem.\\\"\\n\",\"ignore-check.kube-linter.io/pdb-unhealthy-pod-eviction-policy\":\"\\\"Managed by upstream Loki chart (no value exposed for unhealthyPodEvictionPolicy).\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector runs requires certain host mounts to watch files being created by pods.\\\"\\n\",\"ignore-check.kube-linter.io/unset-cpu-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\",\"ignore-check.kube-linter.io/unset-memory-requirements\":\"\\\"Minio post-job containers from chart do not expose resource configuration options.\\\"\\n\"},\"name\":\"vector-scc-binding-dev-extras\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"kubearchive-vector-scc-user\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"minio-sa\",\"namespace\":\"product-kubearchive-logging\"},{\"kind\":\"ServiceAccount\",\"name\":\"minio\",\"namespace\":\"product-kubearchive-logging\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:42:23Z",
                "name": "vector-scc-binding-dev-extras",
                "resourceVersion": "28897",
                "uid": "e5af47d8-41df-42be-aea9-1b3d62ee89ce"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "kubearchive-vector-scc-user"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "minio-sa",
                    "namespace": "product-kubearchive-logging"
                },
                {
                    "kind": "ServiceAccount",
                    "name": "minio",
                    "namespace": "product-kubearchive-logging"
                }
            ]
        },
        {
            "apiVersion": "rbac.authorization.k8s.io/v1",
            "kind": "ClusterRoleBinding",
            "metadata": {
                "annotations": {
                    "argocd.argoproj.io/sync-wave": "-1",
                    "argocd.argoproj.io/tracking-id": "vector-tekton-logs-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:tekton-logging/vector-tekton-logs-collector",
                    "ignore-check.kube-linter.io/drop-net-raw-capability": "\"Vector Runs requires access to socket.\"\n",
                    "ignore-check.kube-linter.io/run-as-non-root": "\"Vector Runs as Root and attach host Path.\"\n",
                    "ignore-check.kube-linter.io/sensitive-host-mounts": "\"Vector Runs requires certain host mounts to watch files being created by pods.\"\n",
                    "kubectl.kubernetes.io/last-applied-configuration": "{\"apiVersion\":\"rbac.authorization.k8s.io/v1\",\"kind\":\"ClusterRoleBinding\",\"metadata\":{\"annotations\":{\"argocd.argoproj.io/sync-wave\":\"-1\",\"argocd.argoproj.io/tracking-id\":\"vector-tekton-logs-collector-in-cluster-local:rbac.authorization.k8s.io/ClusterRoleBinding:tekton-logging/vector-tekton-logs-collector\",\"ignore-check.kube-linter.io/drop-net-raw-capability\":\"\\\"Vector Runs requires access to socket.\\\"\\n\",\"ignore-check.kube-linter.io/run-as-non-root\":\"\\\"Vector Runs as Root and attach host Path.\\\"\\n\",\"ignore-check.kube-linter.io/sensitive-host-mounts\":\"\\\"Vector Runs requires certain host mounts to watch files being created by pods.\\\"\\n\"},\"labels\":{\"app.kubernetes.io/component\":\"Agent\",\"app.kubernetes.io/instance\":\"vector-tekton-logs-collector\",\"app.kubernetes.io/managed-by\":\"Helm\",\"app.kubernetes.io/name\":\"vector\",\"app.kubernetes.io/version\":\"0.45.0-distroless-libc\",\"helm.sh/chart\":\"vector-0.41.0\"},\"name\":\"vector-tekton-logs-collector\"},\"roleRef\":{\"apiGroup\":\"rbac.authorization.k8s.io\",\"kind\":\"ClusterRole\",\"name\":\"vector-tekton-logs-collector\"},\"subjects\":[{\"kind\":\"ServiceAccount\",\"name\":\"vector-tekton-logs-collector\",\"namespace\":\"tekton-logging\"}]}\n"
                },
                "creationTimestamp": "2026-05-13T20:42:02Z",
                "labels": {
                    "app.kubernetes.io/component": "Agent",
                    "app.kubernetes.io/instance": "vector-tekton-logs-collector",
                    "app.kubernetes.io/managed-by": "Helm",
                    "app.kubernetes.io/name": "vector",
                    "app.kubernetes.io/version": "0.45.0-distroless-libc",
                    "helm.sh/chart": "vector-0.41.0"
                },
                "name": "vector-tekton-logs-collector",
                "resourceVersion": "27144",
                "uid": "668d38c7-5113-44c5-b573-a1999f4251a7"
            },
            "roleRef": {
                "apiGroup": "rbac.authorization.k8s.io",
                "kind": "ClusterRole",
                "name": "vector-tekton-logs-collector"
            },
            "subjects": [
                {
                    "kind": "ServiceAccount",
                    "name": "vector-tekton-logs-collector",
                    "namespace": "tekton-logging"
                }
            ]
        }
    ],
    "kind": "List",
    "metadata": {
        "resourceVersion": ""
    }
}
